Analyst, Actuarial

Schenectady or Rochester, NY - Posted: 12/19/17 | SHARE:


The IT Security Analyst is responsible for monitoring the IT security infrastructure in a corporate network, articulating technical security requirements, monitoring the effectiveness of the existing IT security controls framework, and raising the level of security awareness and policy compliance among MVP staff. The IT Security Analyst is to increase information confidentiality, integrity, and availability through the integration of security policies, security awareness, access controls and environmental controls.

  • Responsibilities include working with the Information Technology teams and business units to develop, maintain and monitor an effective Information security program which is designed to ensure the logical and physical protection of the company’s technical resources which include information, equipment and software.
  • Responsible for administering the execution of security assessments of core applications and associated IT systems to identify potential risks, evaluate internal controls, and ensure information security requirements are upheld.
  • Effective use of all available information security related systems and tools to ensure compliance with information security policies and the monitoring of system and network activities to protect the availability, integrity and confidentiality of corporate and customer information.
  • Monitors enforcement of policies, procedures and associated plans for information security and user system access based on industry-standard best practices.
  • Recognizes and identifies areas where security policies and procedures require change or new ones need to be developed.
  • Conducts research on emerging products, services, protocols, and standards in support of security enhancement and development efforts.
  • Develops recommendations on how to apply research or findings to business operations.
  • Configures and utilizes MVP’s Security Event and Information Management (SEIM) system to detect and provide proper alerting based on defined security event correlations and thresholds. Monitors information system logs for unusual or suspicious activity.
  • Interprets activity and coordinates activities to resolve identified issues.
  • Maintains procedures/processes for administration and options. Oversees implementation of security technologies with a cross functional team to monitor security systems and applications throughout MVP’s network.
  • Investigates potential security issues and documents findings as part of security incident reporting requirements.
  • Conducts regular security reviews of user accounts and associated privileges of critical systems within IT infrastructure.
  • Works with various business departments to coordinate regular reviews of security access.
  • Defines security requirements to be included as part of business applications and technology implementations.
  • Coordinates and executes information security control activities related to supporting MVP’s SSAE16 report. Performs other related duties as assigned.


Minimum Education:
Bachelor’s degree or equivalent work experience is required in Computer Science/Information Systems/Information

Minimum Experience:

2-3 years of experience in the information security arena required.
Hands-on experience performing security audits and risk assessments preferred.
Experience in achieving security compliance with Health Care and other related industry regulations including HIPAA,
PCI, SOX, etc.
Professional certifications (CISSP, SANS GIAC, CCSP, etc.) preferred

Required Skills:
• Broad hands-on knowledge of firewalls, intrusion detection systems, anti-virus software, data encryption, and other
security industry-standard techniques and practices required
• In-depth technical knowledge of network, PC, and platform operating systems (Windows, Unix/Linux, Cisco IOS,
• Strong understanding of TCP/IP and networking/system vulnerabilities.
• Extensive experience utilizing MS Office applications for data acquisition, storage, manipulation, analysis and
• Hands on experience utilizing information security tools and capabilities including forensic analysis tools, SEIM
tools, security assessment tools, and data and link encryption tools

To Apply:

Apply online at 

Return to job listings