Employer Active
Responsibilities:
• Perform initial risk assessment on any new system to identify the level of risk, security gap, and needed security controls.
• Analyze business objectives to insure proper risk assessment and control selection
• Identify the needed controls to insure the protection of confidential information, including customer data protection and corporate trade secrets
• Exhibit deep technical understanding and experience with security technologies including, but not limited to, Intrusion Detection/Prevention, Event Correlation, Firewalls, Antivirus, Antispam, policy enforcement, patch/configuration management, secure application development, etc.
• Exhibit Thorough understanding of the security controls provided in common platforms and applications in the company environment including but not limited to, Unix, Linux, Windows, Oracle, MS SQL, MySql, and Core Network components (HLR, MSC, STP, BSCs), etc.
• Exhibit deep Knowledge of emerging technologies including but not limited to Cloud services, Big Data, and Internet of Things (IoT) and the requirements to secure them.
• Identify the measures to insure the integrity of information and its resiliency against tampering and fraud
• Establish the needed controls to insure the availability of systems and data to customers and corporate
• Act as a primary stakeholder in all technology projects to advise on security issues.
• Insure compliance of the new systems with corporate security policies and industry best practices.
• Provide information and advise to executive management on security risks related to new projects/changes/systems, to help management make informed decisions.
Full Time