×
Register Here to Apply for Jobs or Post Jobs. X

Senior Information Assurance Analyst - Oahu

Job in Honolulu, Honolulu County, Hawaii, 96814, USA
Listing for: HAWAIIAN ELECTRIC CO.
Full Time position
Listed on 2025-12-05
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Job Description & How to Apply Below

Senior Information Assurance Analyst - Oahu

Company: hawaiianel

Posting End Date:
This position will remain open until filled. Early applications are encouraged.

Overview

The P EJ INFORMATION ASSURANCE Department of the P INFORMATION ASSURANCE Division at Hawaiian Electric Company has 1 Management vacancy available. (Role: Professional)

Job Function

Oversees or performs the assessments of Company systems and networks and identifies where those systems/networks deviate from cybersecurity policies, acceptable configurations, or guidance. Provides consulting-level knowledge and expertise for the Information Assurance (IA) division, which includes development and enforcement of cybersecurity policies & standards, cybersecurity risk management activities, information technology (IT) and operational technology (OT) compliance, and secure integration of grid technologies and cloud services.

Supports development of detailed plans and provides requirements for information systems’ security controls and security monitoring solutions. Performs security control reviews to validate the security controls as designed are operating effectively. Develops policies, standards, and procedures to ensure that security controls are adequately designed.

Essential Functions
  • Performs cybersecurity assessments and provides security control requirements for IT and OT projects, including externally hosted applications and grid technology projects.
  • Develops and manages programs and processes for privacy, e-discovery, security awareness training, digital forensics, patch management, vulnerability remediation, and other security and compliance programs.
  • Supports detailed review and approval processing for various policies, processes, and procedures necessary to support the Company’s cybersecurity security and compliance requirements.
  • Ensures that adequate and proper internal controls, processes, practices, and standards are developed, maintained, and tested in order to meet the Company’s policy and compliance requirements.
  • Supports the business continuity planning, disaster recovery planning, and the Company’s Cybersecurity Incident Management Team (CS-IMT), with occasional on-call support.
  • Participates in Company emergency response activities as assigned, including any activities required to prepare for such emergency response.
Qualifications

Knowledge Requirements

  • Computer networking concepts and protocols, and network security methodologies.
  • Risk management processes (e.g., methods for assessing and mitigating risk).
  • Cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • Laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
  • Cyber threats and vulnerabilities.
  • Cryptography and cryptographic key management concepts.
  • Data backup and recovery concepts.
  • Host/network access control mechanisms (e.g., access control list, capabilities list).
  • Network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
  • Traffic flows across the network (e.g., TCP/IP, OSI, ITIL).
  • Programming language structures and logic.
  • System and application security threats and vulnerabilities (e.g., buffer overflow, cross-site scripting, injections, etc.).
  • Network attacks and a network attack’s relationship to both threats and vulnerabilities.
  • System administration, network, and operating system hardening techniques.
  • Different classes of attacks and attackers.
  • Cyber-attack stages and defense concepts.
  • Network security architecture concepts including topology, protocols, components, and defense-in-depth.
  • Security models and ethical hacking principles and techniques.
  • Penetration testing principles, tools, and techniques.
  • Conceptual knowledge of NIST Standards, ISO 27000, OWASP, and other security frameworks.
  • Conceptual knowledge of utility business and related OT Systems (SCADA, DCS, etc.).

Skills

  • Conducting vulnerability scans and recognizing vulnerabilities in security systems.
  • Assessing the robustness of security systems and designs.
  • Detecting host and network-based intrusions via intrusion detection technologies…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary