Gathering your results ...
5 days
Not Specified
Not Specified
Not Specified
<p>GENERAL DESCRIPTION OF POSITION</p> <p>The Information Security Engineer is responsible for supporting applications used by Information Security including automation, security architecture, and other critical functions.</p> <p>ESSENTIAL DUTIES AND RESPONSIBILITIES</p> <ol> <li> <p>Manage the applications & infrastructure specific to the Information Security teams, and ensure functionality & uptime meets operational needs.</p> </li><li> <p>Assist in designing and implementing an automation strategy for Information Security, including the selection and maintenance of automation platforms.</p> </li><li> <p>Execute the vulnerability management program, determining criticality of patches & working with Information Security Governance team to monitor compliance.</p> </li><li> <p>Manage Discovery and Data Loss Prevention security analytics platform and partner with stakeholders to develop the strategy for this environment to support future needs.</p> </li><li> <p>Ensure security tools are updated to reflect a complete, accurate and valid inventory of all systems, infrastructure and applications.</p> </li><li> <p>Conducts vulnerability assessments and other security reviews of systems to ensure remediation based on the risk profile of the asset.</p> </li><li> <p>Reviews and recommends improvements to company security posture leveraging concepts such as network segmentation, resilient authentication, least privileged access, privacy by design, etc.</p> </li><li> <p>Develop and maintain security architecture artifacts (models, templates, standards and procedures) that can be used to leverage security capabilities in projects and operations.</p> </li><li> <p>Participate in application and infrastructure projects to provide security planning advice.</p> </li><li> <p>Determine baseline security configuration standards for operating systems (e.g., operating system hardening), network segmentation, and other technologies.</p> </li><li> <p>Develop standards and practices for data protection within the company, including technologies such as encryption and tokenization.</p> </li><li> <p>Track developments and changes in the technology and threat environments to ensure that these are adequately addressed in security strategy plans and architecture artifacts.</p> </li><li> <p>Advocate security best practices & share insights with stakeholders in a variety of areas (secure coding, architecture, system/app administration, system hardening, etc.) and recommend changes to enhance security & reduce risk..</p> </li><li> <p>Participate in the Vendor Due Diligence process as needed to conduct security assessments of existing and prospective vendors.</p> </li><li> <p>Assists in e-discovery procedures when necessary.</p> </li><li> <p>Provide support and guidance for legal and regulatory compliance efforts, including audit support.</p> </li><li> <p>Assist in defining metrics and reporting that effectively communicate performance & maturity of the security program.</p> </li><li> <p>Assist Information Security leadership in developing strategy and roadmaps for Security team.</p> </li><li> <p>Complete required BSA/AML training and other compliance training as assigned.</p> </li><li> <p>The ability to work in a constant state of alertness and in a safe manner.</p> </li></ol> <p>21.Perform any other related duties as required or assigned.</p> <p>QUALIFICATIONS</p> <p>To perform this job successfully, an individual must be able to perform each essential duty mentioned satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required.</p> <p>EDUCATION AND EXPERIENCE</p> <p>Technical degree required in such disciplines as Computer Engineering, CPA, etc., plus 6 years related experience and/or training, and 2 years related management experience, or equivalent combination of education and experience.</p> <p>COMMUNICATION SKILLS</p> <p>Ability to read a limited number of words and recognize similarities and differences between words and between series of numbers; ability to write and speak simple sentences as a means for basic communication. Ability to read and understand simple instructions, short correspondence, notes, letters and memos; ability to write simple correspondence. Ability to read and understand documents such as policy manuals, safety rules, operating and maintenance instructions, and procedure manuals; ability to write routine reports and correspondence. ability to effectively communicate information and respond to questions in person-to-person and small group situations with customers, clients, general public and other employees of the organization. Ability to read, analyze, and understand general business/company related articles and professional journals; ability to speak effectively before groups of customers or employees. ability to write reports, business correspondence, and policy/procedure manuals; ability to effectively present information and respond to questions from groups of managers, clients, customers, and the general public. Ability to read, analyze, and understand common scientific and technical journals, financial reports, and legal documents; ability to respond to complex or difficult inquiries or complaints from customers, regulatory agencies, or members of the business community.</p> <p>MATHEMATICAL SKILLS</p> <p>Ability to calculate figures and amounts such as discounts, interest, commissions, proportions, percentages, area, circumference, and volume. Ability to apply concepts such as fractions, ratios, and proportions to practical situations.</p> <p>CRITICAL THINKING SKILLS</p> <p>Ability to apply principles of logical or scientific thinking to a wide range of intellectual and practical problems. Ability to deal with nonverbal, logical or scientific symbolism such as formulas, scientific equations, and graphs. Ability to deal with a variety of abstract and concrete variables.</p> <p>REQUIRED CERTIFICATES, LICENSES, REGISTRATIONS</p> <p>Minimum, 1 certification in cybersecurity such as CISSP, CISM, or Azure Security Engineer Associate, or ability to obtain within 6 months.</p> <p>PREFERRED CERTIFICATES, LICENSES, REGISTRATIONS</p> <p>Microsoft Information Protection Administrator SC-400</p> <p>Administering Information Security in Microsoft 365 SC-401</p> <p>Information Systems Security Architecture Professional (ISSAP) ISC2</p> <p>Certified Cloud Security Professional (CCSP) ISC2</p> <p>SOFTWARE SKILLS REQUIRED</p> <p>Intermediate: Database, Human Resources Systems, Presentation/PowerPoint, Spreadsheet, Word Processing/Typing</p> <p>Basic: Other, Payroll Systems, Programming Languages</p> <p>PHYSICAL ACTIVITIES</p> <p>The following physical activities described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions and expectations.</p> <p>Semi-repetitive, low physical. Semi-repetitive type work which requires periods of concentration for varied time cycles as prescribed by the tasks.</p> <p>While performing the functions of this job, the employee is continuously required to sit, talk or hear; occasionally required to stand, walk, use hands to finger, handle, or feel. The employee must occasionally lift and/or move up to 10 pounds. Specific vision abilities required by this job include close vision; and color vision.</p> <p>ENVIRONMENTAL CONDITIONS</p> <p>The following work environment characteristics described here are representative of those an employee encounters while performing essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.</p> <p>The noise level in the work environment is usually moderate.</p> <p>WORKING CONDITIONS</p> <p>Somewhat disagreeable working conditions. Continuously exposed to one or two elements such as noise, intermittent standing, walking, pushing, carrying, or lifting. May involve some travel and/or work is at times, in the evening or during the night hours.</p> <p>ADDITIONAL INFORMATION</p> <p>Required:</p> <ul> <li>A four-year college degree in one of the following disciplines: Cybersecurity, Information Assurance, Management Information Systems, Computer Science, OR equivalent work experience </li><li>Five (5) years of experience, in a dedicated technical role such as data loss prevention, vulnerability management, security engineering, etc </li><li>Direct, hands-on experience managing security infrastructure such as firewalls, IPSs, WAFs, endpoint protection, data loss prevention tools, vulnerability management tools </li><li>Knowledge of applications, databases, operating systems, hypervisors, IP networks, storage networks, backup networks and media </li><li>Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions to identify the best solution </li><li>Strong problem-solving and trouble-shooting skills </li><li>Ability to effectively influence without authority </li><li>An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business </li><li>An understanding of organizational mission, values, and goals, and the ability to consistently apply this knowledge </li><li>Strong leadership abilities, with the capability to develop and guide information security team members and IT operations personnel, and work with minimal supervision </li><li>A strong understanding of the business impact of security tools, technologies and policies </li><li>Ability to react quickly, decisively and deliberately in high-stress, high-impact situations </li></ul> <p>Preferred:</p> <ul> <li>3+ years working with & defending a hybrid on-prem/cloud or full cloud environment, including Microsoft 365/Entra/Purview/Defender </li><li>Experience in IT operations managing various technologies such as clients, servers, firewalls, etc </li><li>Experience managing security infrastructure such as firewalls, IPSs, WAFs, endpoint protection, SIEM and log management technology </li></ul>
POST A JOB
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!