Assist with monitoring and auditing of information systems activities and systems to confirm information security policy compliance and provide management with security policy compliance assessments and system monitoring reports.
In this role, the selected candidate will be responsible for leveraging sound IT knowledge to identify/respond to common attacks through common vectors and methods with support from senior team members as needed.
Configures and installs complex information systems (including hardware and software) that have been purchased. Advises the project/support team during negotiations on complex technical aspects of information systems and products to ensure accurate information.
In this role, you will serve as a subject matter expert, making technical recommendations on service/software enhancements to drive efficiency gains within the implementation process and will take a leadership role with special projects.
The ideal candidate will also analyze system designs and implementations of the PIR software from a security perspective and discovering subtle security issues that appear under unexpected threat scenarios.