Cybersecurity Data Protection Analyst

Posted:
9/18/2024, 6:00:19 PM

Location(s):
Karnataka, India ⋅ Tlaquepaque, Jalisco, Mexico ⋅ Jalisco, Mexico

Experience Level(s):
Junior ⋅ Mid Level ⋅ Senior

Field(s):
IT & Security

Workplace Type:
Remote

Cybersecurity Data Protection Analyst

Description -

Cybersecurity Data Protection Analyst

As the world around us becomes more connected and digital, there are increased opportunities for fraud and disruption due to cybersecurity attacks. The need for companies, products, and services to be secure is more important than ever in this constantly changing landscape.

Are you passionate about keeping good people safe from bad actors?  We are too!  We are HP Cybersecurity, and we are tasked with the security of the HP enterprise.  As HP continues our digital transformation, the work of the cybersecurity professional is never complete and is always interesting.  Come be a part of making a difference with us!

The HP Cybersecurity Data Protection Analyst is responsible for supporting the development and management of data governance and loss prevention methods and tools.  This role involves monitoring data activity, responding to data handling events and ensuring compliance with data protection policies.  The ideal candidate will have a background working in cybersecurity, good analytical skills and the ability to work collaboratively across different teams.  They will also identify opportunities for improvements.

This position is a flexible full-time remote working position with the expectation that the employee will be available when needed to join occasional meetings outside of core working hours.

What a Cybersecurity Data Protection Analyst does at HP:

  • Gathers requirements, proposes solutions, implements new technologies and configurations to support change as the various data governance and protection programs mature.
  • Contributes to the continuous improvement and maturation of HP’s Data Loss Prevention tools and methods.
  • Creates and maintains comprehensive documentation for processes.
  • Monitors alerts and investigates possible policy violations or data loss events.
  • Knows the HP Cyber Policies and helps to direct employees to relevant policy language and/or acceptable technologies/processes.
  • Identifies, supports, trains and engages Data Protection champions as needed.
  • Assists in preparing training documentation and delivering training as needed.
  • Engages other teams in HP Cybersecurity when needed, employing warm hand-offs and developing strong partnerships.
  • Prepares and presents reports, communicates risk for inclusion in scorecards, and briefings as required.
  • Monitors industry cybersecurity threats, cybersecurity best practices, regulatory changes, corporate updates, and geo-political changes impacting HP’s security.
  • Advises on improvements to data handling procedures and applies good governance concepts.

Individuals who thrive in this role at HP typically have:

  • Bachelor’s degree (preferably in a related area of study, or equivalent experience).
  • 3-5 years of relevant experience developing policy, reviewing data loss event alerts, and/or conducting investigations.
  • Technical Cyber Security Certification through one of the recognized bodies a bonus: SANS, ISACA, (ICS)2, CompTIA.
  • Solid working knowledge of industry frameworks and standards and best practices.
  • Results-driven, strong analytical skills, ability to connect the dots to make better decisions.
  • Fluent in oral and written communications.
  • Able to work effectively in a team and with various stakeholders at various organizational levels.
  • Good responsiveness, organizational, and time management skills.
  • Proactive in seeking problem resolution.

About the team:

The Cybersecurity Data Protection team is a developing group of cyber security professionals who collaborate with all disciplines within Cybersecurity as well as business and functional stakeholders as trusted advisors to effectively manage cyber security risks to the business.



Knowledge & Skills
• Cybersecurity operations
• Cybersecurity governance
• Cybersecurity policies
• Data Analysis
• Risk identification
• Automation
• Issue tracking
• Security controls

Cross-Org Skills
• Effective Communication
• Results Orientation
• Learning Agility
• Digital Fluency
• Customer Centricity


Disclaimer
• This job description describes the general nature and level of work performed in this role. It is not intended to be an exhaustive list of all duties, skills, responsibilities, knowledge, etc. These may be subject to change and additional functions may be assigned as needed by management.

Job -

Information Technology

Schedule -

Full time

Job -

Information Technology

Schedule -

Full time

Shift -

No shift premium (India)

Travel -

Relocation -

Equal Opportunity Employer (EEO)

HP, Inc. provides equal employment opportunity to all employees and prospective employees, without regard to race, color, religion, sex, national origin, ancestry, citizenship, sexual orientation, age, disability, or status as a protected veteran, marital status, familial status, physical or mental disability, medical condition, pregnancy, genetic predisposition or carrier status, uniformed service status, political affiliation or any other characteristic protected by applicable national, federal, state, and local law(s).

Please be assured that you will not be subject to any adverse treatment if you choose to disclose the information requested. This information is provided voluntarily. The information obtained will be kept in strict confidence.

If you’d like more information about HP’s EEO Policy or your EEO rights as an applicant under the law, please click here: Equal Employment Opportunity is the Law Equal Employment Opportunity is the Law – Supplement

Hewlett Packard (HP)

Website: http://www.hp.com/

Headquarter Location: Palo Alto, California, United States

Employee Count: 10001+

Year Founded: 1939

IPO Status: Public

Last Funding Type: Post-IPO Equity

Industries: Computer ⋅ Consumer Electronics ⋅ Hardware ⋅ IT Infrastructure ⋅ Software