In this role, you will be responsible for creating and maintaining information technology and information security policies, standards and procedures which safeguard the integrity of and access to enterprise systems, files and data elements.
In this role, the selected candidate will lead and mature enterprise vulnerability scanning solutions for a large IT enterprise; educate and mentor cross-functional individuals on identified vulnerabilities and remediation strategies.
This position is responsible for maintaining consistent and accurate product data within the Product Information Management (PIM) system; enabling data integration with SAP and other software platforms.
In this role, the selected candidate will be responsible for recommending improvements in procedures, processes, operations and systems; collaborating with Product Management and Engineering to enhance products.
In this position, you will provide network monitoring and log analysis from a variety of network sensors (e.g. firewalls, network taps, SIEM tools or packet capture software) to investigate suspect network activity.
In this role, you will be responsible to participates in projects and assists in the execution of project plans to help ensure compliance with security policy and standards. Develops, executes, or coordinates security projects, including deployment and operation of firewalls, intrusion detection and prevention systems and flow analysis tools.
In this role, you will focus on building and running Security Operations programs and executing on strategic projects including MFA, log monitoring and analysis, incident response, vulnerability and patch management, threat intelligence.
In this role, you will support the coordination, planning and execution of the annual IT budget and IT financial management processes; maintain IT asset data base and report on asset values, depreciation, and forecast.
This role is responsible for providing risk evaluation, threat modeling, and deep technical expertise on projects and technology products. This role will work closely with the Director of Threat and Vulnerability Management to identify, evaluate, and prioritize potential weaknesses in ESIs infrastructure and applications using both manual and automated methods.
The position will require working with end users to design and develop enhancements applications that are critical to the success of the business. In addition, the position will involve supporting existing applications specifically our Telephone Number Administration System, called ANIMate.
In this role, the selected candidate will assist with the development of policies and technical configuration standards; assist with the development of security training materials and programs for use throughout the firm.