Security Data Analyst
Waste Management

Houston, Texas

This job has expired.


Equal Opportunity Employer: Minority/Female/Disability/Veteran

WM, a Fortune 250 company, is the leading provider of comprehensive waste and environmental services in North America. We are strongly committed to a foundation of operating excellence, professionalism and financial strength. WM serves nearly 25 million customers in residential, commercial, industrial and municipal markets throughout North America through a network of collection operations, transfer stations, landfills, recycling facilities and waste-based energy production projects.

To enable our business to expand our lead in a market increasingly enhanced by technology, Waste Management is undertaking a substantial technology transformation. We are seeking talented Information Technology professionals to join the Waste Management team who are motivated to help us transform the way we design, build and use technology. With your skills and experience, we look for you to combine your technical expertise with industry best practices in an effort to align information technology solutions with Waste Management business strategy.

Job Summary

Responsible for establishing and maintaining a corporate wide information security management program to ensure that information and data are adequately protected. This position is responsible for identifying, evaluating, and reporting on information security exposure in a manner that meets compliance and regulatory requirements, and aligns with and supports the risk posture of the enterprise.

The position requires a leader with sound knowledge of business analyst and a working knowledge of information security technologies. They will proactively work with business units to implement practices that meet defined policies and standards for information security. He or she will also oversee a variety of IT-related risk management activities.

The ideal candidate is a thought leader, a consensus builder, and an integrator of people and processes. While the ISM is the leader of the security program, he or she must also be able to coordinate disparate drivers, constraints and personalities, while maintaining objectivity and a strong understanding that security is just one of the business's activities.

II. Duties and Responsibilities

  • Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program to ensure that the integrity, confidentiality and availability of information is owned, controlled or processed by the organization.
  • Manage the scan process to identify key data
  • Facilitate information security governance through the implementation of a hierarchical governance program, including the formation of an information security steering committee or advisory board.
  • Develop, maintain and publish up-to-date information security policies, standards and guidelines.
  • Create and manage information security and risk management awareness training programs for all employees, contractors and approved system users.
  • Work directly with the business units to facilitate IT risk assessment and risk management processes, and work with stakeholders throughout the enterprise on identifying acceptable levels of risk
  • Provide regular reporting on the current status of the information security program to enterprise risk teams, senior business leaders as part of a strategic enterprise risk management program.
  • Implement structure for roles and responsibilities with regard to information ownership classification, accountability and protection.
  • Liaise with the enterprise architecture team to ensure alignment between the security and enterprise architectures, thus coordinating the strategic planning implicit in these architectures.
  • Coordinate information security with resources from the IT organization and business unit teams.
  • Ensure that security programs comply with relevant laws, regulations and policies to minimize or eliminate risk and audit findings.
  • Facilitate the information security risk assessment process, including the reporting and oversight of treatment efforts to address negative findings.
  • Monitor the external threat environment for emerging threats, and advise relevant stakeholders on the appropriate courses of action.
  • Facilitate a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the security.
  • Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services, including, but not limited to risk management and compliance

Security Liaison

  • Liaise among the information security team and corporate compliance, privacy, audit, legal and HR management teams as required.
  • Manage security issues and incidents, and participate in problem and change management forums.
  • Work with various stakeholders to identify information asset owners to classify data and systems as part of the scaling and implementation.
  • Work with the IT and business stakeholders to define metrics and reporting strategies that effectively communicate successes and progress of the security program.
  • III. Supervisory Responsibilities

  • Consult with IT and security staff to ensure that security is factored into the evaluation, selection, installation and configuration of hardware, applications and software.
  • Recommend and coordinate the implementation of technical controls to support and enforce defined security policies.
  • Research, evaluate, design, test, recommend or plan the implementation of new or updated information security hardware or software, and analyze its impact on the existing environment; provide technical and managerial expertise for the administration of security tools.
  • Develop a strong working relationship with the security engineering team to develop and implement controls and configurations aligned with security policies and legal, regulatory and audit requirements.
  • Coordinate measure and report on the technical aspects of security management.
  • Manage outsourced vendors that provide information security functions for compliance with contracted service-level agreements.
  • Manage and coordinate operational components of incident management, including detection, response and reporting.
  • Manage the day-to-day activities of threat and vulnerability management, identify risk tolerances, recommend treatment plans and communicate information about residual risk.

  1. Education and Experience:
  • Required: Bachelor's Degree (accredited) in Computer Science, MIS, Business Administration or similar area of study, or in lieu of degree, High School Diploma or GED (accredited) and 4 years of relevant experience. Five years' experience as a Business Analyst in addition to education requirement

B. Certificates, Licenses, Registrations or Other Requirements

None required.

C. Other Knowledge, Skills or Abilities Required

  • Possesses technical knowledge with hands-on experience to the following technology areas:
  • Network Design/Administration
  • Firewall and other security tools and technologies, along with intrusion prevention and detection protocols
  • Active directory
  • Cloud technologies
  • Wireless technologies
  • Operational Support
  • Implementation/Administration w/Information Security Tools
  • Information Security Incident Handling
  • Information Security risk assessment, risk mitigation and incident response experience
  • Anti-virus, Anti-spam, endpoint protection

D. Other Knowledge, Skills or Abilities that Contribute to Success

None required.

V. Work Environment and Essential Functions

Listed below are key points regarding environmental demands and work environment of the job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of the job. [Note: the following is defaulted for office setting position]

  • Required to use motor coordination with finger dexterity (such as keyboarding, machine operation, etc) most of the work day;
  • Required to exert physical effort in handling objects less than 30 pounds rarely;
  • Required to be exposed to physical occupational risks (such as cuts, burns, exposure to toxic chemicals, etc) rarely;
  • Required to be exposed to physical environment which involves dirt, odors, noise, weather extremes or similar elements rarely;
  • Normal setting for this job is: office setting.
  • Benefits
  • At WM, each eligible employee receives a competitive total compensation package including Medical, Dental, Vision, Life Insurance and Short Term Disability. As well as a Stock Purchase Plan, Company match on 401K, and more! Our employees also receive Paid Vacation, Holidays, and Personal Days. Please note that benefits may vary by site.
  • You and your family can go back to school - and it's on us! Access WM's education benefit, Your Tomorrow, and see what's possible. Benefits-eligible team members can receive 100% tuition coverage for 135+ fully funded programs - including bachelor's degrees, high school completion, college prep, professional certificates and more. Plus WM will contribute toward 40+ master's programs! Even better, all required books and out-of-pocket fees for education programs are 100% reimbursable.
  • Don't forget, Your Tomorrow is also available for dependents. WM will pay 100% of the tuition for children ages 18 to 26 and spouses of benefits-eligible team members for more than 35 in-demand programs from high-quality schools and universities including undergraduate degrees, short-form technology and business certificate programs and high school completion. Students only pay for books.

  • Ready to learn more? Get started today at wm.guildeducation.com


This job has expired.

Get Hired Faster

Subscribe to job alerts and upload your resume!

*By registering with our site, you agree to our
Terms and Privacy Policy.

More Sales jobs


GFL Industries
Baylis, Illinois
$30.00 per hour
Posted about 22 hours ago
GFL Industries
Thorp, Wisconsin
$25.00 per hour
Posted about 22 hours ago
GFL Industries
Indianapolis, Indiana
Posted about 22 hours ago
View Sales jobs »