In this role, you will be responsible for data security pertaining to, but not limited to, identifying potential security vulnerabilities, determining what controls are necessary in order to protect the data, determining the effectiveness of the controls already or designed to be put in place.
In this role, you will research & validate cutting edge technologies by diving into the full stack to build pilots for our clients. You will design enterprise scale platforms, build APIs, web apps, data processing architectures and more.
In this role, you will provide leadership and direction for the infrastructure and security operations of the companys technology systems. This position is responsible for the company technology infrastructure and data security processes to effectively coordinate, manage, and improve business operations. As the chief information security officer, this position is responsible for aligning security initiatives with enterprise programs and business objectives, ensuring that information assets and technologies are adequately protected.
In this role, the selected candidate will ensure continued improvement in information security and cyber security risk management across the TLC, through the continual refinement and implementation of the Information Security and Cyber security Framework.
In this role, you will create, implement and maintain the tools that perform traffic capture for network analysis by utilizing packet broker switches, load balancers, network taps and network SPAN sessions.
In this role, the selected candidate will work alongside a talented team of colleagues and quintessentially creative individuals who are building next-generation mobile, web and back-end applications and services.
In this role, you will be responsible for providing technical expertise with responsibilities on one or more of these areas in support of end point security applications and/or technologies: design, planning, development, installation, configuration, maintenance, monitoring, capacity planning, troubleshooting, problem resolution, business continuity, disaster recovery, backup and fail-over in accordance with enterprise standards and process.