Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailGENERAL DESCRIPTION OF POSITION
The Information Security Engineer is responsible for supporting applications used by Information Security including automation security architecture and other critical functions.
ESSENTIAL DUTIES AND RESPONSIBILITIES
1. Manage the applications & infrastructure specific to the Information Security teams and ensure functionality & uptime meets operational needs.
2. Assist in designing and implementing an automation strategy for Information Security including the selection and maintenance of automation platforms.
3. Execute the vulnerability management program determining criticality of patches & working with Information Security Governance team to monitor compliance.
4. Manage Discovery and Data Loss Prevention security analytics platform and partner with stakeholders to develop the strategy for this environment to support future needs.
5. Ensure security tools are updated to reflect a complete accurate and valid inventory of all systems infrastructure and applications.
6. Conducts vulnerability assessments and other security reviews of systems to ensure remediation based on the risk profile of the asset.
7. Reviews and recommends improvements to company security posture leveraging concepts such as network segmentation resilient authentication least privileged access privacy by design etc.
8. Develop and maintain security architecture artifacts (models templates standards and procedures) that can be used to leverage security capabilities in projects and operations.
9. Participate in application and infrastructure projects to provide security planning advice.
10. Determine baseline security configuration standards for operating systems (e.g. operating system hardening) network segmentation and other technologies.
11. Develop standards and practices for data protection within the company including technologies such as encryption and tokenization.
12. Track developments and changes in the technology and threat environments to ensure that these are adequately addressed in security strategy plans and architecture artifacts.
13. Advocate security best practices & share insights with stakeholders in a variety of areas (secure coding architecture system/app administration system hardening etc. and recommend changes to enhance security & reduce risk..
14. Participate in the Vendor Due Diligence process as needed to conduct security assessments of existing and prospective vendors.
15. Assists in ediscovery procedures when necessary.
16. Provide support and guidance for legal and regulatory compliance efforts including audit support.
17. Assist in defining metrics and reporting that effectively communicate performance & maturity of the security program.
18. Assist Information Security leadership in developing strategy and roadmaps for Security team.
19. Complete required BSA/AML training and other compliance training as assigned.
20. The ability to work in a constant state of alertness and in a safe manner.
any other related duties as required or assigned.
QUALIFICATIONS
To perform this job successfully an individual must be able to perform each essential duty mentioned satisfactorily. The requirements listed below are representative of the knowledge skill and/or ability required.
EDUCATION AND EXPERIENCE
Technical degree required in such disciplines as Computer Engineering CPA etc. plus 6 years related experience and/or training and 2 years related management experience or equivalent combination of education and experience.
COMMUNICATION SKILLS
Ability to read a limited number of words and recognize similarities and differences between words and between series of numbers; ability to write and speak simple sentences as a means for basic communication. Ability to read and understand simple instructions short correspondence notes letters and memos; ability to write simple correspondence. Ability to read and understand documents such as policy manuals safety rules operating and maintenance instructions and procedure manuals; ability to write routine reports and correspondence. ability to effectively communicate information and respond to questions in persontoperson and small group situations with customers clients general public and other employees of the organization. Ability to read analyze and understand general business/company related articles and professional journals; ability to speak effectively before groups of customers or employees. ability to write reports business correspondence and policy/procedure manuals; ability to effectively present information and respond to questions from groups of managers clients customers and the general public. Ability to read analyze and understand common scientific and technical journals financial reports and legal documents; ability to respond to complex or difficult inquiries or complaints from customers regulatory agencies or members of the business community.
MATHEMATICAL SKILLS
Ability to calculate figures and amounts such as discounts interest commissions proportions percentages area circumference and volume. Ability to apply concepts such as fractions ratios and proportions to practical situations.
CRITICAL THINKING SKILLS
Ability to apply principles of logical or scientific thinking to a wide range of intellectual and practical problems. Ability to deal with nonverbal logical or scientific symbolism such as formulas scientific equations and graphs. Ability to deal with a variety of abstract and concrete variables.
REQUIRED CERTIFICATES LICENSES REGISTRATIONS
Minimum 1 certification in cybersecurity such as CISSP CISM or Azure Security Engineer Associate or ability to obtain within 6 months.
PREFERRED CERTIFICATES LICENSES REGISTRATIONS
Microsoft Information Protection Administrator SC400
Administering Information Security in Microsoft 365 SC401
Information Systems Security Architecture Professional (ISSAP) ISC2
Certified Cloud Security Professional (CCSP) ISC2
SOFTWARE SKILLS REQUIRED
Intermediate: Database Human Resources Systems Presentation/PowerPoint Spreadsheet Word Processing/Typing
Basic: Other Payroll Systems Programming Languages
PHYSICAL ACTIVITIES
The following physical activities described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions and expectations.
Semirepetitive low physical. Semirepetitive type work which requires periods of concentration for varied time cycles as prescribed by the tasks.
While performing the functions of this job the employee is continuously required to sit talk or hear; occasionally required to stand walk use hands to finger handle or feel. The employee must occasionally lift and/or move up to 10 pounds. Specific vision abilities required by this job include close vision; and color vision.
ENVIRONMENTAL CONDITIONS
The following work environment characteristics described here are representative of those an employee encounters while performing essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
The noise level in the work environment is usually moderate.
WORKING CONDITIONS
Somewhat disagreeable working conditions. Continuously exposed to one or two elements such as noise intermittent standing walking pushing carrying or lifting. May involve some travel and/or work is at times in the evening or during the night hours.
ADDITIONAL INFORMATION
Required:
A fouryear college degree in one of the following disciplines: Cybersecurity Information Assurance Management Information Systems Computer Science OR equivalent work experience
Five 5 years of experience in a dedicated technical role such as data loss prevention vulnerability management security engineering etc
Direct handson experience managing security infrastructure such as firewalls IPSs WAFs endpoint protection data loss prevention tools vulnerability management tools
Knowledge of applications databases operating systems hypervisors IP networks storage networks backup networks and media
Strong decisionmaking capabilities with a proven ability to weigh the relative costs and benefits of potential actions to identify the best solution
Strong problemsolving and troubleshooting skills
Ability to effectively influence without authority
An understanding of business needs and commitment to delivering highquality prompt and efficient service to the business
An understanding of organizational mission values and goals and the ability to consistently apply this knowledge
Strong leadership abilities with the capability to develop and guide information security team members and IT operations personnel and work with minimal supervision
A strong understanding of the business impact of security tools technologies and policies
Ability to react quickly decisively and deliberately in highstress highimpact situations
Preferred:
3 years working with & defending a hybrid onprem/cloud or full cloud environment including Microsoft 365/Entra/Purview/Defender
Experience in IT operations managing various technologies such as clients servers firewalls etc
Experience managing security infrastructure such as firewalls IPSs WAFs endpoint protection SIEM and log management technology
Full-Time