Provide technical expertise and advise on all areas of security technology, including: network security, platform security, authentication/authorization systems, application security, security architecture, policy enforcement, and security frameworks.
In this role, the selected candidate will be responsible for leveraging sound IT knowledge to identify/respond to common attacks through common vectors and methods with support from senior team members as needed.
In this role, you will serve as a subject matter expert, making technical recommendations on service/software enhancements to drive efficiency gains within the implementation process and will take a leadership role with special projects.
Configures and installs complex information systems (including hardware and software) that have been purchased. Advises the project/support team during negotiations on complex technical aspects of information systems and products to ensure accurate information.
The ideal candidate will also analyze system designs and implementations of the PIR software from a security perspective and discovering subtle security issues that appear under unexpected threat scenarios.
Assist with monitoring and auditing of information systems activities and systems to confirm information security policy compliance and provide management with security policy compliance assessments and system monitoring reports.
In this role, the selected candidate will provide network security related design review, assessment, secure and requirements for any and all network/OS level services as part of the Cloud Services expansion.