You will have the opportunity to do more infrastructure related activities (windows administration, network configuration, application support, etc). You will also be working alongside a DBA to help support his needs.
This position will perform day to day administration, support, and maintenance of various cybersecurity related identity and access management systems (e.g. CA SSO, Okta, CyberArk, ISIM, Active Directory, RACF, Radiant Logic VDS/FID, SAML Federation, LDAPs, etc.)
Working as the sole Business Improvement Analyst and Project Lead, nationally, you will have great responsibility and autonomy working in collaboration with our entrepreneurial, empowering and passionate executive team to create structure.
You will be given the opportunity to take on significant responsibility and develop your technical and business skills with one of the most respected companies in Chicago and in the global financial services industry.
Support the operation of Tennecos IT security infrastructure, services, and programs including Security Event Management program, Vulnerability Management program, intrusion detection and prevention, PKI, certificates, malware protection, web application defenses and data leakage prevention.
Must be able to effectively analyze application security reports to identify application security risk as well as interpret scope/breadth/depth of assessments performed as compared with application demos received.
This role is responsible to complete tasks associated with Physical Security People and Protection Programs which include system administration services for Security Equipment such as Pass Administration, Intake from Internal/External Customers, and retrieving data to support Criminal Investigations. Change Management
Utilizes experience in order to identify problematic relationships. Anticipates, prevents and eliminates problems and creates efficient fixes. Facilitates elimination of problems and roadblocks before they occur.
Responsible for creation and maintenance of user accounts and active directory, as well as many other peripheral systems; utilize security rules to grant/revoke access to applications, servers, group folders, etc.
Develops Continuity of Operation (COOP)/Disaster Recovery (DR) plans and supports certification of Information Systems and Networks -Supervises operation of Electronic Key Management System, other information security duties, and Public Key Infrastructure.