Must Have skills:
Information Security
Computer Incident Response Team (CIRT) / Computer Emergency Response Team (CERT) / Computer Security Incident Response Center (CSIRC) / Security Operations Center (SOC)
Perl or Python or PowerShell
VPN
Firewall
Strong understanding of PCI, GLBA and IS/IT risk assessment, the Federal Financial Institution Examination Council (FFIEC) IT examination handbooks, and National Institute of Standard and Technology (NIST) 800-53 and Cybersecurity Framework.
Responsibilities
- Research, design, and implements information security solutions for organization systems and products that comply with all applicable security policies and standards
- Works with IT and internal and external business partners to ensure that acquired hardware and software meet security requirements during evaluation, selection, installation, and configuration
- Analyzes and makes recommendations to improve network, system, and application architectures
- Examines network, server, and application logs to determine trends and identify security incidents
- Assists in the review and update of information security policies, architectures, and standards
- Assists in establishing and maintaining security configuration baselines and monitors systems for compliance
- Assists in responding to audits, penetration tests and vulnerability assessments
- Install and use software, such as firewalls and data encryption programs, to protect the organizations’ sensitive information.
- Assists computer users with installation or processing of new security products and procedures.
- In the event of a breach or incident, leads incident response activities for the Information Security team to minimize the impact.
- In the event of a breach or incident, leads a technical and forensic investigation into how the breach happened and the extent of the damage
- Performs risk assessments to determine our stature against specific threats in order to recommend solutions
- Develop and recommend policies, standards and procedures that are in compliance with statutory and regulatory requirements that cover internal and external parties, physical security systems, internet and computer systems
- Assisting and training the Information Security Analysts and Administrators
Qualifications
- BS in Computer Science, Information Security, or a related field is highly desirable
- 5+ years of experience in information security, especially in a security engineering role
- 3+ years of past experience in a role on a Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC) is highly desirable
- Certified Information Systems Security Professional (CISSP) or equivalent required
- Technical expertise in network security knowledge, to include VPN, Firewall, network monitoring, intrusion detection, web server security, SIEM, NAC, PAM, IAM, CIS Security Controls, other security related applications, and wireless security
- Strong knowledge of common vulnerabilities and exploitation techniques
- Practical experience with database security, content filtering, vulnerability scanning, and anti-malware
- Proficiency with at least one scripting language (e.g.: Perl, Python, PowerShell)
- Knowledge of risk assessment tools, technologies and methods
- Experience designing secure networks, systems and application architectures
- Knowledge of disaster recovery, computer forensic tools, technologies and methods
- Experience planning, researching and developing security policies, standards and procedures
- Ability to communicate network security issues to peers and management
- An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business
- An understanding of organizational mission, values, and goals and consistent application of this knowledge
- Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one
- An ability to effectively influence others to modify their opinions, plans, or behaviors
- Strong understanding of PCI, GLBA and IS/IT risk assessment, the Federal Financial Institution Examination Council (FFIEC) IT examination handbooks, and National Institute of Standard and Technology (NIST) 800-53 and Cybersecurity Framework.