The Information Security Engineer is a rock star who delivers security solutions. The Information Security Engineer regularly consults the IT teams and other areas of the business to help interpret and communicate risk. This role also works with subject matter experts within the IT teams to ensure that only the right technologies and processes are implemented in the right places.
In this role, the selected candidate must have the ability to assist team members & Vendors with proper artifact collection and detail to clients examples of artifacts that will satisfy assessment requirements.
Provide an interface between the business, project management, architect and information security teams for new projects;evaluate project plans and technical details to guarantee security across the board.
The Cyber Security Architect will ensure that Visteon is protected from any potential leaks or malicious activities through security hardening, new product review, and implementation of security technologies necessary to secure Visteons enterprise.
Support daily operations for the ZF User Management (ZUM) group across Region North America; this group supports the ZF User Management and Information Protection guidelines and principles through management of user accounts, as well as access and authorization rights.
Participates in structured walk throughs and technical reviews.Ensures that application coding and design follows secure coding and design principles.Takes a small request completely through the business and technical design.This job profile is not meant to be all inclusive of the responsibilities of this position; may perform other duties as assigned or required.
Provide technical expertise to analyze, implement, and operationalize information security solutions in support of information security program, as well as, develop or streamline supporting processes to ensure the appropriate security controls are maintained.
The Information Security Engineer regularly consults the IT teams and other areas of the business to help interpret and communicate risk. This role also works with subject matter experts within the IT teams to ensure that only the right technologies and processes are implemented in the right places.
The Information Security Business Analyst must be proficient at requirements management including eliciting requirements, simplifying requirements, and assisting in the translation of business requirements into technical security solutions.
This role regularly meets with the IT teams, along with other areas of the business, to help interpret and communicate risk. This team member creates solutions that will keep our clients and companys information secure.
Responsible for managing the phases of the CISO as a Service framework (Assessment, implementation, operations) covering all aspects of IT Security function, including operations, new projects, third party vendors, managed services and other related costs.
Elicit requirements using interviews, document analysis, requirements workshops, surveys, site visits, business process descriptions, use cases, scenarios, business analysis, task and workflow analysis.
The Information security analysts responsibilities will primarily be related to vulnerability management and SIEM. It will also include monitoring and management of IPS, anti-virus, malware analysis and threat management.