Description

RESPONSIBILITIES

·       Serve as a security expert in networks, endpoints, and enterprise applications efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices.

·       Manage vulnerability assessments on various types of networks and topologies;

·       Execute risk and vulnerability assessments and remediation activities.

·       Conduct penetration testing on IT infrastructure.

·       Analyze output from network vulnerability assessments, recommend mitigation strategies and resolve any security incidents through work with pertinent business departments.

·       Review and provide feedback on security plans and procedures regarding all aspects of LAN, WAN or MANs, as applicable;

·       Review and provide input into networks and endpoints designs to ensure compliance with security and enterprise architecture.

·       Review in-house and 3rd-party applications/code for security vulnerabilities and best practices.

·       Build/enhance security architecture and configure networks and endpoints to enhance the security posture of the enterprise.

·       Research, design, and advocate new technologies, architectures, and security
products that will support security requirements for the enterprise and its customers,
business partners, and vendors.

·       Participate in Software Development Lifecycle: code review, QA security testing, launches, etc.

·       Develop and/or implement automated security testing tools where possible.

·       Participate in the development of security-related tools and applications, such as multi-platform cookie-based authentication and internal security libraries/frameworks.

·       Train engineers on common security problems and best practices for writing secure code.

·       Performs hands-on testing of applications, as well as building and enforce information risk management requirements and structure, including providing practical secure architecture skills and developing and implementing Information Security best practices.

·       Lead and execute projects on our security roadmap.

·       Adhere to existing risk management frameworks, such as COBIT, ITIL, and ISO 27002.

·       Participate in managing incident response for network security events.

·       Develop and maintain IT security policies.

·       Provide input and visibility into emerging security technologies, deployment strategies and other security protocols to ensure awareness within the IT security branch.

MINIMUM QUALIFICATIONS, KNOWLEDGE, SKILLS, AND ABILITIES:

Formal Education & Certification

·       Bachelor's degree in information technology, Computer Sciences or equivalent. Master’s degree desirable

·       Possessing at least one professional security certification such as CISSP, CISM, CISA or similar.

 

Knowledge & Experience

·       7 years or more of professional experience in IT security including security policy development, security architecture models, and information security regulatory compliance

·       Must have the knowledge of IT security technologies such as firewalls, intrusion detections systems, antivirus, patch management, etc., and the interest and experience to work on security policy and architecture

·       Hands-on experience with the following technologies: enterprise system administration across multiple operating systems, IPS management (i.e., Cisco ASA, Palo Alto, TrendMicro), vulnerability scanning applications, Splunk

·       Experience in engineering and enterprise system administration roles.

·       Experience developing a standard set of metrics that measure our security posture on a
monthly/weekly basis.

·       Proven experience developing security policies, procedures, risk registers and incident
response plans

·       Intermediate to advanced knowledge of information security concepts.

·       Experience with one or more applications development languages such as Python, Go, Ruby on Rails, Java, C/C++, .NET.

·       Solid knowledge of and experience with secure web architectures, tools and processes

·       Knowledge of network architecture and design, network Security, wireless Security and client/server security. Very strong computer networking skills and understanding of networking protocols.

·       Security of virtual machine environments is highly desirable.

·       Expert knowledge and hands-on experience of vulnerability assessment/network discovery and associated tools

·       Understands infrastructure monitoring 

·       Expert in securing Linux and Windows systems.

·       Experience with various types of firewalls and technologies

·       Demonstrated process improvement experience

·       Previous application development experience is very helpful for secure code reviews

·       Hands-on experience using multiple Amazon Web Services and Azure technologies to support an enterprise environment.

·       Prior experience as a team lead or role mentoring junior team members.

·       Experience with threat detection and incident management for web applications

 

Skills & Abilities

·       Basic skills needed include:

-          Secure solutions development

-          Middleware security

-          N-tier apps dev infrastructure

-          Compliance – PCI, GLB, GLBA, CMMC. GDPR, etc.

-          Risk management and security risk assessments

-          Code review, reverse engineering

-          API’s and protocols

-          Authentication and authorization. SSO (Single Sign On), MFA (Multi- Factor Auth.).

·       Enterprise aware (change control, downstream impacts, understanding of cause and effect, change windows, etc.)

·       Recognized as a strategic thinker and is results oriented

·       Demonstrated effective strong team player and self-motivator. Ability to work and interface internally with an IT and other functional support groups with minimal guidance

·       Demonstrated successful experience in a customer-facing role

·       Demonstrated communicator both written and verbal, with effective presentation delivery and meeting facilitation 

·       Demonstrated effective time management, organizational and documentation skills

·       Good analytical and troubleshooting skills with strong attention to detail

Education

  Bachelor's degree in information technology, Computer Sciences