In this role, the selected candidate will enforce security policies and procedures by administering and monitoring security profiles; review security violation reports and investigates possible security exceptions; update, maintain and document security controls.
In this role, the selected candidate must have deep knowledge of current technologies including Open Source, J2EE (JSP, Servlet, JSP, etc.), web application development, web services (REST/SOAP/XML), Rich Internet Applications, messaging infrastructures and databases.
In this role, you will provide Information Security expertise and guidance to business group leaders and IT owners to evaluate and articulate application security requirements; identify potential security risk factors and business impact.
In this role, you will be responsible to partner with key business functions, internal IT staff and external auditors to ensure that the SOX compliance program and key controls for IT processes and procedures are in place and monitored across the organization.
In this role, you will be responsible to participates in projects and assists in the execution of project plans to help ensure compliance with security policy and standards. Develops, executes, or coordinates security projects, including deployment and operation of firewalls, intrusion detection and prevention systems and flow analysis tools.
In this role, you will research, evaluate, and assess emerging cyber threats to digital assets. The selected candidate will identify security risks, threats and vulnerabilities in networks, systems, and applications.