ServiceNow - Madison, WI

posted 4 days ago

Full-time - Mid Level
Madison, WI
5,001-10,000 employees
Professional, Scientific, and Technical Services

About the position

The Staff Security Incident Remediation Analyst at ServiceNow plays a crucial role in enhancing the security posture of the organization by managing the Major Security Incidents (MSI) lifecycle. This position focuses on improving the post-incident recovery process, ensuring effective communication and collaboration across teams, and driving accountability for recovery actions. The analyst will leverage data analysis skills to interpret incident data and provide actionable insights, ultimately contributing to the security of ServiceNow's platform and its customers.

Responsibilities

  • Establish, maintain, and evolve documentation and processes governing MSI Recovery activity.
  • Document all Recovery findings.
  • Employ data analysis skills to interpret incident data and generate actionable insights.
  • Meet with stakeholders and owners of Recovery findings to agree on a path forward for resolution.
  • Serve as a key point of contact for all Recovery item owners.
  • Track the status of each Recovery item, ensuring accountability and progress towards resolution.
  • Report regularly on the status and milestones of Recovery items to senior management and executive stakeholders.
  • Collaborate effectively with cross-functional teams to ensure cohesive Recovery item resolution strategies and implementations.
  • Develop and maintain strong communication channels across the organization to facilitate timely and clear information sharing.
  • Serve as a key driver to tangibly and meaningfully improve the security of the ServiceNow platform, our infrastructure, and the many ways our customers use the platform.

Requirements

  • 8+ years of experience as a Business System Analyst or similar role.
  • High motivation to own and drive change.
  • Excellent demonstrable oral and written communication skills.
  • Experience developing and maintaining business process documentation.
  • Experience maintaining and improving large complex datasets with meticulous detail.
  • Experience communicating with an executive audience.
  • Experience in incident response at a global company.
  • Familiarity with the security incident response lifecycle.

Nice-to-haves

  • Experience within the application security domain, particularly hyperscale hosted software-as-a-service (SaaS) applications.
  • Demonstrable experience driving change in a complex organization.
  • Experience managing security incidents.
  • Familiarity with cybersecurity frameworks (e.g., MITRE ATT&CK).
  • Working understanding of the Agile framework.
  • Knowledge across multiple security domains (e.g., security engineering, security architecture, security governance).
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service