This individual will work with the department manager to develop the vision and strategy for the system architecture as well as planning and executing the implementation of Fiserv's Enact CRM system, running on Microsoft Dynamics.
In this role, the successful candidate will lead, coach and mentor development teams to incorporate security while developing highly scalable, distributed applications involving connected devices (IoT), mobile applications and cloud services.
The Information Security Engineer is responsible for the design, configuration, implementation, maintenance, testing, and monitoring of the Enterprise Information Security Program's technical controls, including but not limited to the Banks infrastructure, network, systems and applications.
In this role, the selected candidate will perform full cycle engagaments of penetration testing on business units independently, or as part of a team; configure, run and monitor automated security testing tools.
This individual will investigate and quantify long running trends in the enterprise environment; implement and maintain analytic methods and techniques; develop and maintain consistent repeatable methodologies for detecting complex phenomenon; and assist in all development, data gathering and data analysis tasks.
In this role, the selected candidate will maintain and promote the security posture of our products from the technical perspective, in view of todays increasing levels of security threats & challenges.
As a Penetration Tester you will be responsible for working closely with other teams at , while testing their application environments. You will exhibit a strong sense of customer obsession while working with those teams in a consulting facility.
This individual will possess strong written, verbal, and presentation skills and communications. The senior information security consultant must have the drive and ability to facilitate, lead, manage, and present a multitude of information security projects to high-level management & stakeholders.
The security architect will be responsible for defining the security of the end-to-end security architecture looking at the people, process and technology required for successful delivery and risk mitigation.
The selected candidate will maintains client confidence and protects operations by keeping client and clients employee information confidential.Makes customers and their needs a primary focus of ones actions; developming and sustaining productive customer relationships.
Evaluate Regional Computer Emergency Response Team-Continental US (RCERT-CONUS) and Army Computer Emergency Response Team (ACERT) alerts and provide local assessments of vulnerability to IAM and local DOIM management.