In this role, the selected candidate will maintain the network security system infrastructure uptime, manage device policies, troubleshoot configuration issues and maintain integration with centralized log management and Security Incident and Event Management (SIEM) related infrastructure.
Perform periodic infrastructure and application security assessments of routine to moderate complexity and reviews for evidence of vulnerability or compromise and assists in or facilitates the implementation of resolution.
In this role, the selected candidate will lead new and recurring 3rd party security risk assessments, develop mitigation plans, and work with internal stakeholders to assign remediation tracking responsibility.
In this role, the selected candidate will pursue continuing education to grow and maintain knowledge of best practices, compliance requirements, and threats and trends in the information security, translating into operational action items, policies, procedures, standards and guidelines as part of the IT Security team.
Responsible for performing requirements analysis, design, development and implementation of modifications to existing information technology (IT) systems or support development and implementation of new IT systems.
You will monitor, audit, secure and protect business critical operational data, systems and processes within these standards while also understanding the business drivers that exist within the enterprise.
Work with business stakeholders to capture business requirements (reaching out to multiple lines of business within the organization) and translate them into technical terms for the resources administering the solution.
This individual will participate in a team of network security professionals in a 24x7 Enterprise IT Security Operations organization. He/She will be part of the enterprise infrastructure of the Network Security team, such as implementation of firewall rules and VPN administration.