Cyber Security Engineer III
Elkhart IN
must be a US Citizen or GCH
TRCC is dedicated to delivering outstanding customer service focused on safety and built around our core values: Customer Service Respect Excellence
Stewardship and Teamwork. Spanning 157 miles across northern Indiana ITRCC implements our core values to offer a safer and more efficient way of commuting.
Why were different:
ITRCCs efficiency relies on our team members; at the ITRCC you wont just be part of a company you will be part of a family who respects their members and strives
to cultivate sustainability. We are actively involved in the community and care for the wellbeing of our team members. We understand the importance of work/life
balance while offering hybrid schedules for flexibility and productivity.
Summary:
Responsible for responding to cybersecurity incidents oversees the remediation of system vulnerabilities manages cyber security toolsets and aligns systems to the organizations security standards and compliance requirements.
Relationships:
- Directly report to the Head of Cyber Security.
- Direct interactions to work with and support the internal IT team.
- Direct interaction with employees from various departments including supervisors and managers.
- Direct interaction with security vendors and regulatory entities.
Responsibilities:
- Performs all tasks safely complies with all internal and external safety requirements supports ITRCC safety culture attends all safety trainings and completes all compliance trainings as required by ITRCC.
- Uphold ITRCCs core values: Customer Service Respect Excellence Stewardship and Teamwork (CREST).
- Monitors for Security Anomalies Violations of policies and other Security Breaches.
- Responds to Security related incidents and events in an organized and efficient manner providing well-documented reports.
- Leads a Vulnerability management program working with other IT staff to guide patching and remediation.
- Performs testing and verification of company security controls provides organized reporting based on findings.
- Management of security tools such as firewalls vulnerability scanners SIEM asset discovery tools antivirus toolset and email protection toolsets.
- Assisting in aligning systems to organization-wide security policies/protocols.
- Collaborates with internal and external stakeholders such as auditors and regulatory bodies to ensure compliance with relevant security standards compliance and regulations.
- Stays up to date with the latest cybersecurity threats vulnerabilities and industry best practices.
- Contribute to security recommendations to Network/System Designs.
- Participates in the security On-call rotation.
- Other duties as assigned.
- Regular reliable attendance.
Qualifications:
- Bachelors degree in computer science or equivalent work experience.
- Work experience in information security.
- Knowledge of penetration testing network security and the techniques used to expose and correct security flaws
- A broad understanding of security technologies including firewalls proxies Security Information and Event Management (SIEM) antivirus software and Identity Providers (IdPs)
- Understanding of vulnerability management and the ability to identify and spotlight vulnerabilities on on-premises and remote networks correct problems and prevent security breaches
- Ability to prioritize and create remediation guidelines for system vulnerabilities.
- The ability to think critically and innovatively about security solutions that can keep data safe while maintaining and high level of availability for business systems.
- Ability to communicate effectively both verbally and written with customers co-workers and business contacts in a courteous and professional manner
- Must possess and maintain a valid drivers license
- Ability to perform work independently with minimal guidance and supervision
- Demonstrated history.
MUST HAVE:
- Bachelors degree in computer science or equivalent work experience.
- Work experience in information security.
- Knowledge of penetration testing network security and the techniques used to expose and correct security flaws.
- A broad understanding of security technologies including firewalls proxies Security Information and Event Management (SIEM) antivirus software and Identity Providers (IdPs)
- Understanding of vulnerability management and the ability to identify and spotlight vulnerabilities on on-premises and remote networks correct problems and prevent security breaches
- Must possess and maintain a valid drivers license.
Required Knowledge Skills and Abilities: (Companies ATS Questions):
1. Do you have a Bachelors degree in computer science or equivalent work experience.
2. Do you have Work experience in information security.
3. Do you have Knowledge of penetration testing network security and the techniques used to expose and correct security flaws.
4. Do you have a broad understanding of security technologies including firewalls proxies SecurityInformation and Event Management (SIEM) antivirus software and Identity Providers (IdPs)
5. Do you have understanding of vulnerability management and the ability to identify and spotlight vulnerabilities on on-premises and remote networks correct problems and prevent security breaches
6. Do you have possess and maintain a valid drivers license.
7. Must be a US Citizen or Green Card holder.