Work with business stakeholders to capture business requirements (reaching out to multiple lines of business within the organization) and translate them into technical terms for the resources administering the solution.
Responsible for performing requirements analysis, design, development and implementation of modifications to existing information technology (IT) systems or support development and implementation of new IT systems.
In this role, the selected candidate will maintain the network security system infrastructure uptime, manage device policies, troubleshoot configuration issues and maintain integration with centralized log management and Security Incident and Event Management (SIEM) related infrastructure.
In this role, the selected candidate will lead new and recurring 3rd party security risk assessments, develop mitigation plans, and work with internal stakeholders to assign remediation tracking responsibility.
Perform periodic infrastructure and application security assessments of routine to moderate complexity and reviews for evidence of vulnerability or compromise and assists in or facilitates the implementation of resolution.
This individual will participate in a team of network security professionals in a 24x7 Enterprise IT Security Operations organization. He/She will be part of the enterprise infrastructure of the Network Security team, such as implementation of firewall rules and VPN administration.
In this role, the selected candidate will pursue continuing education to grow and maintain knowledge of best practices, compliance requirements, and threats and trends in the information security, translating into operational action items, policies, procedures, standards and guidelines as part of the IT Security team.
You will monitor, audit, secure and protect business critical operational data, systems and processes within these standards while also understanding the business drivers that exist within the enterprise.
The selected candidate will participate as a shift lead on a 24x7x365 team that monitors, analyzes, and responds to information security related threats such as commodity malware, policy violations, and advanced persistent threats.