The Information Security Engineer regularly consults the IT teams and other areas of the business to help interpret and communicate risk. This role also works with subject matter experts within the IT teams to ensure that only the right technologies and processes are implemented in the right places.
The Software Security Architect is primarily responsible for interacting with development teams, other Software Architects and the business to help define how the business should develop secure solutions.
The Information Security Architect is the forward-looking rock star who knows, intuitively, where the puck is going and can put us in the right spot. The Architect works with various areas of the business to collaborate on strategy, help design secure solutions.
Provide technical expertise to analyze, implement, and operationalize information security solutions in support of information security program, as well as, develop or streamline supporting processes to ensure the appropriate security controls are maintained.
This role regularly meets with the IT teams, along with other areas of the business, to help interpret and communicate risk. This team member creates solutions that will keep our clients and companys information secure.
Participates in structured walk throughs and technical reviews.Ensures that application coding and design follows secure coding and design principles.Takes a small request completely through the business and technical design.This job profile is not meant to be all inclusive of the responsibilities of this position; may perform other duties as assigned or required.
Provide an interface between the business, project management, architect and information security teams for new projects;evaluate project plans and technical details to guarantee security across the board.
Elicit requirements using interviews, document analysis, requirements workshops, surveys, site visits, business process descriptions, use cases, scenarios, business analysis, task and workflow analysis.
Responsible for managing the phases of the CISO as a Service framework (Assessment, implementation, operations) covering all aspects of IT Security function, including operations, new projects, third party vendors, managed services and other related costs.
The Information security analysts responsibilities will primarily be related to vulnerability management and SIEM. It will also include monitoring and management of IPS, anti-virus, malware analysis and threat management.
The Information Security Business Analyst must be proficient at requirements management including eliciting requirements, simplifying requirements, and assisting in the translation of business requirements into technical security solutions.
Support daily operations for the ZF User Management (ZUM) group across Region North America; this group supports the ZF User Management and Information Protection guidelines and principles through management of user accounts, as well as access and authorization rights.
In this role, the selected candidate must have the ability to assist team members & Vendors with proper artifact collection and detail to clients examples of artifacts that will satisfy assessment requirements.
The Information Security Engineer creates and maintains the technologies/processes used by Information Security Analysts to perform their everyday functions. Ideal applicants are detail-oriented, love to take risks and will constantly challenge assumptions.