FAQs
Do we support remote work?
Yes, we work in a hybrid format, which includes 4 days a week in the office.
What is the primary role of the Information Security Administrator?
The primary role of the Information Security Administrator (ISA) is to support business units in complying with GCS security policy and required controls, providing critical support for the first line of defense within the organization.
What qualifications are required for this position?
The position requires at least 6 years of information security experience, effective communication skills, strong computer skills, and proficiency in PowerPoint, Word, and MS Excel, among other skills.
Is experience in financial services preferred?
Yes, financial services experience is considered a plus for this position.
Are there opportunities for professional development?
Yes, there are educational support programs and development opportunities available to help you reach your full potential within the organization.
What are some key responsibilities of the ISA?
Key responsibilities include supporting application owners in risk management assessments, monitoring compliance, assisting in remediation efforts, and contributing to reports on program activities.
What certifications are beneficial for this role?
Industry certifications such as ISO 27001, CISA, or CISM are considered beneficial for this role.
Is the company committed to diversity and inclusion?
Yes, State Street is committed to creating an inclusive environment and welcomes candidates of diverse backgrounds, experiences, and perspectives.
What tools and technologies will the ISA be expected to work with?
The ISA will work with word processing, spreadsheet, email, and collaborative tools, along with advanced technologies related to cybersecurity and risk management.
How does the ISA contribute to communication and awareness within the organization?
The ISA supports the creation of education and awareness content, develops standard operating procedures, and ensures employees understand the latest governance and monitoring requirements related to information security.