The Security Architect guides various information systems initiatives, projects, and systems to provide a secure computing environment. Provides design recommendations for new information security and information systems deployments and products.
The Project Analyst performs the essential functions required to ensure consistent, quality and successful delivery, while working within competing demands of scope, schedule, cost, risk, and stakeholder expectations.
In this role, the selected candidate will be responsible for researching and analyzing potential cyber security threats, assessing related weaknesses within the vehicles electrical architecture and proposing potential security solutions.
IP Security tunnel changes experience with Checkpoint Firewalls, including an ability to make static route changes and an ability to make simple firewall policy changes. Utilize monitoring tools such as Solarwinds.
Assess business requirements to design optimal policy for scanning to obtain the optimum results with minimum business disruptions; monitoring, Triaging and escalation of Information Protection System alerts based on scan results.
The Stores Engineering IT Analyst position responsibilities include but are not limited to store systems design, store systems administration, mobile device management, software deployment, and payment authorization.
The IT Compliance Analyst will participate and lead initiatives including controls and compliance review. This position will also monitor, and as necessary, coordinate compliance activities of external auditors.
Define together with sales and marketing department business requirements, potential solutions and use cases for e-commerce implementations; support organizational change management in business department for e-commerce tool.
Write detailed User Stories & identify specific, measurable/testable acceptance criteria. Creates detailed functional specifications and data models for development of new products or modifications to existing products & definition of detailed test plans.
Creates, revises and maintains processes and procedures related to continuous monitoring, triage, incident analysis and incident response activities. Consults with other cyber associates to continuously improve those processes and procedures and ensure that when new tools or external inputs change that the documentation is adjusted accordingly.
Conducts quality-control tests and analyses to ensure that software meets or exceeds specified standards and end-user requirements. Ensures the most complex project requirements are executable, testable, complete and not ambiguous.