Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailUnder the general guidance of the IT/Security Architect or Systems Manager the candidate will be responsible for evaluating and implementing new technologies yzing cybersecurity related components and controls ociated to the product process and solution and identify and resolve potential issues to help enhance and secure a large enterprise network. The position requires a broad foundation of IT/Security architectural experience with an understanding of Internet server/storage technologies cloud services/integrations are a must. The candidate will be responsible for designing complex and innovative solutions addressing vulnerability detection threat and risk ysis network intrusion securing technology ets across the application infrastructure cloud and data tiers and development/implementation of vulnerability mitigation strategies. This is a handson team member who actively works with various teams including security infrastructure and development teams to improve our overall security standards. This position is expected to be the last level of technical escalation within the company for the igned responsibilities.
Guides Cyber Governance and Information Protection team and makes informed security decisions on the design of infrastructure systems and applications.
Works with tech leads and teams to ensure security is built into app development network infrastructure and cloud systems. Work with necessary Information Technology groups to satisfy specific technology related issues. Act as an Information Security liaison between the customers and all groups in Information Technology
Implements industry leading practices around cyber risks and Cloud security and perform security essments of cloud platforms/environments using industry standard frameworks such as ISO CSACSM and NIST
Designs and develops security policies standards and procedures e.g. firewall rules SSL/IPSec security incident and event management (SIEM) data protection (DLP encryption) user account management (SSO SAML) and pword/key management.
Identifies software weaknesses that could lead to exploitable vulnerabilities such as SQL injection crosssite scripting crosssite request forgery buffer overflows use of hardcoded pwords weak encryption sensitive data.
Seasoned professional with detailed technical knowledge of techniques standards and stateofthe art capabilities for authentication and authorization applied cryptography security vulnerabilities and remediation. Can advise on architecture decisions at technical and product level.
Adequate knowledge of web related technologies (Web applications Web Services and Service Oriented Architectures) and of network/web related protocols.
Experience working with Cloud security posture management tools.
Constantly looking for better ways of solving security problems and designing the solution not afraid of challenging the status quo.
Respond swiftly to all alerts performing initial risk/impact essments or escalating issues as appropriate
Follow change management controls and guidelines.
Support operating organizations during corporate emergencies. Participate in the Companys emergency management processes cyber security and storm plans.
Perform other related tasks and ignments as required.
Ss & Requirements
The following are not required for this position but would be considered as a valuable et in a potential candidate.
Required Ss : Network Security
Basic Qualification :
Additional Ss : Cyber Security Engineer
Background Check : No
Drug Screen : No
Full Time