In this role, you will perform information security risk assessments of information technology assets based on the NIST framework. Provide information security subject matter expertise to several teams and business customers on risk assessments, vulnerability remediation, and threat detection techniques.
In this role, you will lead cross function Policy Council for establishing policies and standards necessary to ensure the security of information system assets and to protect them from intentional or inadvertent access, disclosure, or destruction in accordance with industry standards such as HIPAA, Sarbanes-Oxley, SAS70, DIACAP, and PCI.
In this role, the selected candidate will work closely with solution architects to assist; support and review system and technical design documents to ensure functional and business requirements are met.
In this role, the selected candidate will be responsible for providing support to Client authentication, host and application security services; day to day alerts, incidents and request handling and response in the production environment based on customer requirements.
In this role, the selected candidate will provide leadership and technical guidance in the area of Telecommunications and IT infrastructure including but not limited to management of projects, developing/maintaining technical standards to support reliable, secure communications services to electrical substations, distribution line devices, and field resources.
In this role, you will develop consistent programming standards for all java development local related web architecture. Document system design and standards. Engage with stakeholders to assess, resolve, and execute work requests.
In this role, the selected candidate must have a strong knowledge of Multi-tiered Application security, cloud-based application security, Infrastructure Security or Mobile App security (any 2 is a must).
In this role, you will be installing, implementing, administering, monitoring, and maintaining all security architecture technology solutions including vulnerability management tools, Intrusion detection, and external scanning.
In this role, the selected candidate will be working within the threat management team and responsible for examining security events for context, relevance, criticality and their potential impact to the company.