Deliver Red Team testing related activities ranging from initial project kick-off through project close-out. These engagements range from small to medium and sometimes long-term engagements requiring varied interpersonal and technical skills.
Performing current state risk assessments, continual risk assessments, risk metrics and visualization, risk convergence, IT risk and control framework design, and integrated operational risk management.
This individual will participate in a team of network security professionals in a 24x7 Enterprise IT Security Operations organization. He/She will be part of the enterprise infrastructure of the Network Security team, such as implementation of firewall rules and VPN administration.
The Information Security Engineer is responsible for the design, configuration, implementation, maintenance, testing, and monitoring of the Enterprise Information Security Program's technical controls, including but not limited to the Banks infrastructure, network, systems and applications.
As an Information Security Risk Management Analyst you will be performing, Information Security Risk Management duties; perform duties to support the effort in providing Information Risk management and assessments for IT and business units.
Responsible for creating desired functionality to assigned content, products or services in ecommerce. Develops, tests and implements software that provides robust technical infrastructure and/or software applications used by business units.
In this role, the selected candidate must have a strong hands-on Business Analysis and Data skills: facilitation and gathering of user requirements development of business requirements and functional specifications documents, system and user acceptance testing (UAT), process mapping, data extraction and validation, data mapping, reporting development & automation, building of queries, experience working with data warehouses or databases.
The selected candidate will maintains client confidence and protects operations by keeping client and clients employee information confidential.Makes customers and their needs a primary focus of ones actions; developming and sustaining productive customer relationships.
In this role, the selected candidate will maintain the network security system infrastructure uptime, manage device policies, troubleshoot configuration issues and maintain integration with centralized log management and Security Incident and Event Management (SIEM) related infrastructure.