In this role, the selected candidate will pursue continuing education to grow and maintain knowledge of best practices, compliance requirements, and threats and trends in the information security, translating into operational action items, policies, procedures, standards and guidelines as part of the IT Security team.
In this role, the selected candidate will maintain the network security system infrastructure uptime, manage device policies, troubleshoot configuration issues and maintain integration with centralized log management and Security Incident and Event Management (SIEM) related infrastructure.
The IT Application Developer will join the Digital Business Technology Architecture team, which delivers business solutions for a portfolio including Public Website, ERM Patient Portals, Mobile, Enterprise Intranet, CRM, Marketing Automation, Call Center Solutions, Enterprise Integration, and several other internal and external applications.
The IT Security Analyst supports operations of enterprise security through policy, architecture, training processes, selection and implementation of appropriate security solutions, vulnerability audits and assessments.
The Software Test Engineer defines software test strategy, test metrics and industry standard reports leveraging standard tools to design and develop software with sound, repeatable, industry best practices and in accordance with software development process.
Respond in a timely manner to information security incidents and/or loss or misuse of information assets and participate in investigations and remediation. Provide technical expertise and guidance to the methods and approaches to information assurance as well as the administration of security tools that control and monitor information security.
The Information Security Analyst performs three core functions for TEKsystems (TEK). The first is the identification, investigation and resolution of data security incidents that are caused at our clients by our consultants (these are usually carried out through abusing access rights, theft of data and mishandling physical devices.)
This individual will participate in a team of network security professionals in a 24x7 Enterprise IT Security Operations organization. He/She will be part of the enterprise infrastructure of the Network Security team, such as implementation of firewall rules and VPN administration.
In this role, the selected candidate must have an experience in Windows Office (Work, Excel, etc.) required; experience in UNIX/Linux OS and/or Cisco IOS preferred; experience responding to information security related incidents in an operations environment.