In this role, you will provide technical consulting on the use and integration of applications into the operating environment and responsible for confidentiality of client information and compliance with department standards and procedures.
The Applications Security Engineer will be responsible for the design and implementation of secured solutions and products. Additionally, the Applications Security Engineer will develop and drive AGCOs web application security program as well as support the architecture team.
In this role, you will design, install, implement, maintain, and troubleshoot complex operating systems software and related program products and provides technical consulting on the use and integration of applications into the operating environment.
In this role, you will create, update and maintain various checklists, spreadsheets, databases, and dashboard and custom tool-sets to analyze compliance posture. The selected candidate will utilize and review network scans, tools and log files to report on system compliance, risk and threat levels.
In this role, you will provide full-spectrum systems engineering, integration, manufacturing, and life cycle. The selected candidate will develop and maintain Cyber Security Assessment and Authorization processes to evaluate compliance.
The Security Engineer II will design, build, integrate, and support information security solutions and specifically for the Information Security Cyber Defense area (ISCD) specific to the Endpoint (laptops/desktops/VDI/mobile). The engineer will focus on solutions to support the Security Operations Center in their security efforts related to endpoints, as well as develop new endpoint authoritative endpoint solutions.
In this role, you will assist with the development of a strategic roadmap for PKI by conducting feasibility studies and evaluates solutions with regard to their ability to integrate with the existing infrastructure and their adoption of general security practices.
The selected candidate will review the results from auditing of applications, operating systems and networks to provide a measurable technical assessment that includes interviewing staff personnel, performing security vulnerability scans, reviewing access controls or analyzing physical access to ensure availability, confidentiality and integrity to help the organization meet internal and external regulatory compliance.