In this role, you will provide leadership and direction for the infrastructure and security operations of the companys technology systems. This position is responsible for the company technology infrastructure and data security processes to effectively coordinate, manage, and improve business operations. As the chief information security officer, this position is responsible for aligning security initiatives with enterprise programs and business objectives, ensuring that information assets and technologies are adequately protected.
In this role, you will be responsible for providing technical expertise with responsibilities on one or more of these areas in support of end point security applications and/or technologies: design, planning, development, installation, configuration, maintenance, monitoring, capacity planning, troubleshooting, problem resolution, business continuity, disaster recovery, backup and fail-over in accordance with enterprise standards and process.
In this role, the selected candidate designs, develops and deploys Integration solutions of well-defined, moderate to complex business problems with a high level of reliability, execution and speed using tools such as IBM Integration Bus,ESB, MQ ,Java,SOAP to support Web Service Integrations for MDM , Informatica and SQL Server based Technologies.
In this role, the selected candidate will provide consulting services to increase knowledge of Information Security standards, concerns, interpretation and clarification of policies as well as advise on BU plans to achieve compliance.
In this role, the selected candidate will provide leadership and technical guidance in the area of Telecommunications and IT infrastructure including but not limited to management of projects, developing/maintaining technical standards to support reliable, secure communications services to electrical substations, distribution line devices, and field resources.
The Senior Systems Security Engineer will apply System Security Engineering and Program Protection disciplines (anti-tamper, cyber security, software assurance, supply chain management, and threat and design vulnerability analysis) to the design and development of Company products.
In this role, the selected candidate will maintain up-to-date knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors.
In this role, the selected candidate will manage the various Power, Space, and Network Address allocation and request tools to accurately and effectively create and manage work orders for the physical rack and stack of Physical equipment, as well as Layer1 cabling.
In this role, the selected candidate will ensure those platforms integrate seamlessly with our Management and Monitoring systems. Manage the various Power, Space, and Network Address allocation and request tools to accurately and effectively create and manage work orders for the physical rack and stack of Physical equipment, as well as Layer1 cabling.