The Information Security Analyst will participate in the identification of data sources, analytic capabilities and reporting tools. You will investigate and quantify long running trends in the enterprise environment; implement and maintain analytic methods and techniques; develop and maintain consistent repeatable methodologies for detecting complex phenomenon; and assist in all development, data gathering and data analysis tasks.
In this role, the selected candidate will perform research and test configurations to determine the best solution to meet customer goals and objectives, import/create/modify HBSS Policy Sets, and Tag Creation/Modification Process Queries and Dashboards.
In this role, you will conduct project planning and execution; build trusted relationship; analyze existing processes, roles, organizational structures; and support applications to identify and recommend improvements in processes, organizations, and technologies.
In this role, the selected candidate will develop and maintain a thorough knowledge of company business, identify leads (some leads provided by Inside Sales Reps), manage prospects and acquire new business.
In this role, the Red Team Consultant will work under the guidance of a Customer resource to perform penetration testing on our clients network infrastructure, systems and applications in support of Red Team / Blue Team efforts.
In this role, you will provide information system security support to multiple teams in a fast - paced environment. Write information system security plans and ensure compliance with NIST Risk Management Framework ( RMF ).
In this role, the selected candidate will mentor more junior engineers by leading and influencing technical decisions, processes, and best practices with an expert ability to explain technical concepts in written and verbal forms.
Individual will be responsible for the administration, standardization, and maintenance of a multi-site network infrastructure which includes Cisco PIX/ASA firewalls, and VPN devices, Cisco routers, Cisco backbone switches, and various management tools, reviews, plans, designs, evaluates and monitors network systems, VPN (configuration and administration).
The security engineers are responsible for designing, implementing and evaluating software that makes financial transactions secure; managing private key storage, and best practices for sharing of public keys
In this role, you will ensure project design aligns with the Identity Ecosystem Framework (IDEF) Baseline Functional Requirements and the Functional Model Representation of the Identity Ecosystem documents.
In this role, you will be responsible for the lifecycle management, support, and overall sustainment of Enterprise systems used by partner teams in Network Security to support our Enterprise firewall footprint.