Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailNot Disclosed
Salary Not Disclosed
1 Vacancy
We are seeking an experienced information security engineer. As a security engineer you will help architect deploy and operate a secure application infrastructure that aligns with business needs. Responsible for supporting operational innovation and providing security direction to the business to elevate the companys security posture. An advanced role security engineer helps deliver applications at scale and with resiliency to support business initiatives. Expected to possess troubleshooting skills and be knowledgeable about architecture engineering and design principles and best practices. The security engineer should be adept at dealing with disparate applications and data systems to maintain the level of rigor required to adhere to business direction. Oversee Engineering areas of vulnerability scanning certificate management password policy management data analysis of security monitoring outputs coordination of remediation vulnerabilities and other daily security and compliance efforts.
Qualifications :
Required:
Bachelors degree or direct and applicable work experience.
3 years of experience working in analysis of server or network controls in any of the following: DevOps Identity and Access Management (IAM) Windows and Linux Security Cloud Security Network and Network Security Active Directory Python AWS AWS Security Controls and Services.
Knowledge of compliance and regulatory program requirements such as HIPAA ISO 27000 NIST FISMA and/or SOC standards.
Experience using IAM the following tools: Sailpoint CyberArk AWS Secrets Manager AWS Config.
Strong working knowledge across IT functions (Systems Network Databases and/or Application Development SAST tools Azure DevOps).
Strong analytical and problem-solving skills. A certain degree of creativity innovation and latitude is required (the ability to think outside the box when faced with challenges).
High attention to detail while completing tasks and processes. Ability to prioritize to maximize personal efficiency.
Ability to troubleshoot and interpret user problems and discern appropriate solutions. Ability to look across multiple systems applications and networks to troubleshoot security issues.
Strong compliance and regulatory focused customer service orientation with effective verbal and written communication skills working with technical and nontechnical personnel with the ability to address all levels of leadership business technical and non-technical staff.
Travel required up to 5%
Preferred:
Python Azure RDS Security AWS Policies Azure Devops DevSecOps Federation SSO Cyberark Splunk/Sumo Logic Sailpoint.
Powershell Bash scripting Java programming related to Sailpoint IIQ RHEL Linux versions 7 and 9 Infrastructure as Code using Terraform and/or CDK Pipeline programming for ADO GIT.
Additional Information :
a. Build and maintain the availability of the identity access platforms. Build and maintain the vulnerability threat and scanning tools. Evaluate applications in development for potential vulnerabilities to identify security flaws before they are released to production.
b. Secure business applications and computing environments across public private or hybrid cloud infrastructures.
c. Review and analyze vulnerability data to identify security risks to the organizations network infrastructure and applications. Design implement and improve detection and prevention of vulnerabilities.
d. Provide expertise and best practices for implementing cloud security and secured code detection and prevention.
e. Conduct rigorous oversight of security systems and security configuration administration to reduce risk to enterprise systems and accounts.
f. Oversee the management and remediation of identified security flaws within development platforms.
g. Build and maintain monitoring auditing and reporting frameworks that produce evidence that support security and compliance needs.
h. Actively monitor assess and recommend tactical and strategic initiatives based on new and emerging threats posing risk to cloud computing environments.
i. Develop processes that produce evidence that will support security and compliance requirements.
j. Track security issues in the same work tracking systems leveraged by the development and operations teams to ensure seamless communication and resolution of issues.
k. Manage remediation efforts after security assessment findings outline weaknesses requiring attention.
l. Protect business applications in compliance with privacy security business resiliency and compliance frameworks as defined in corporate policies.
m. Other duties as assigned
All your information will be kept confidential according to EEO guidelines.
Remote Eligible: You will have the flexibility to work where you are most productive. This position is eligible to work fully remote. Depending on your location you may still have the option to come into a Wellmark office if you wish to. Your leader may ask you to come into the office occasionally for specific meetings or other moments that matter as well.
An Equal Opportunity Employer
The policy of Wellmark Blue Cross Blue Shield is to recruit hire train and promote individuals in all job classifications without regard to race color religion sex national origin age veteran status disability sexual orientation gender identity or any other characteristic protected by law.
Applicants requiring a reasonable accommodation due to a disability at any stage of the employment application process should contact us at
Please inform us if you meet the definition of a Covered DoD official.
Remote Work :
No
Employment Type :
Full-time
Full-time