The IA Engineer must be able to perform in a fast-paced environment, research and evaluate tools, standards and technologies, and provide support for proposing, implementing, and enforcing information systems security policies.
Develop enterprise directory security standards, guidelines and procedures for hardening database configurations, users and roles, profiles, etc that support the P&G Info Sec enterprise security strategy.
The selected candidate will be an integral part of an accomplished team of cyber experts in both hardware and software; and will have opportunities to work closely with physicists, mathematicians and other scientific experts from across company.
Meets established expectations and takes responsibility for achieving results; encourages others to do the same; employs focus, attention to detail, reliability, and appropriate prioritization to drive outcomes.
In this role, the selected candidate will be responsible for researching and analyzing potential cyber security threats, assessing related weaknesses within the vehicles electrical architecture and proposing potential security solutions.
Working as a Software Developer for Battelles Cyber business unit to develop and building full-stack web applications including infrastructure tools, system deployment, testing, data analytics and visualization, user interfaces, and automated processing modules.
The Information Security Engineer is responsible for the management and administration of all Information Security related systems and applications. This includes performing and/or coordinating network penetration tests, system/application vulnerability assessment scans, risk assessment reviews, and security application administration (Anti-Virus, Intrusion Detection/Intrusion Prevention Systems, Data Loss Prevention, Security Event/Incident Monitoring, Web Filtering, etc.).
In this role, the selected candidate will perform security testing and vulnerability analysis of data communications and telecommunication networks and comprehend network data flow and protocol stacks.
In this role, the selected candidate will be managing the application of cybersecurity requirements, developing and maintaining new cybersecurity requirements, and validating the security level of vehicles.