In this role, the selected candidate will be responsible for the writing of the code and lead the production and improvement of compliance, quality, and timing of enterprise security architecture for client / delivery teams.
The Information Security team serves as the process owner for all activities related to availability, integrity, and confidentiality of customer, employee, and business information in compliance with the various financial institutions information security policies and procedures.
In this role, the selected candidate will utilize project management skills to ensure timeliness of security projects related to production line firewalls, internet services and security toll deployment.
The successful candidate will join Global Information Security and will be responsible for development and implementation of the Cyber Security Engineering program. This person will work within the engineering realm on product selection, testing, certification, and deployment for accountability of our endpoint security tools.
In this role, the selected candidate will provide troubleshooting support for complex enterprise security environments; configure, monitor and support Manufacturing sites which runs 365 days maintaining 99.999% uptime.
In this role, you will provide pre-sales technical support to Check Point Global Account Managers and strategic Check Point customers, developing POCs & crafting revenue generating services in order to influence sales.
In this role, you will be responsible to develop and support the application security platform, act as subject matter expert for other application development teams who depend on it, and participate on integration projects.
In this role, the selected candidate will provide troubleshooting support for complex enterprise security environments; configure, monitor and support Manfacturing sites which runs 365 days maintaining 99.999% uptime.
In this role, you will be responsible for developing and administering DODI 8510.01 and NIST 800-53 IA security controls assessments and analyzing the results of independent cybersecurity validation testing.
In this role, you will design and implement information assurance and security engineering systems with the requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management).