The successful IT Support Engineer will be responsible for utilizing his/her skills to provide assistance to the operations team in resolving technical problems within the Fulfillment Center that cover a multitude of technical disciplines.
This IT Security Analyst (Awareness and Training) is overall responsible for our security awareness and training program. Ultimately this person's job is to reduce risk to our organization by ensuring all employees, staff and contractors know,understand and follow our security requirements and behave in a secure manner.
Consults with all areas of the business, particularly Product Management and Product Development to advise on matters of security. Architects, Implements, Administers and Operates Information Security Systems.
In this role, the selected candidate will identify security issues for remediation and performs system/network STIG implementation and verification, software certificate of netwrothyness verifications, software and hardware management, system integration assitance and patching/auditing through HBSS, SCCM, SCOM, and SPLUNK.
The Security Engineer is responsible for the design and implementation of enterprise and data center wide voice and data network solutions that align with the architecture and business models to achieve optimal solutions for Acxiom and its customers.
The ideal candidate for position will be a proactive and self-motivated professional who will work with other team members to manage access controls for Visa key information resources residing on multiple platforms, with a focus area in UNIX, Linux and databases.
Design and develop test plans, frameworks and approaches for major and minor software releases. Develop, document and implement test cases for web applications, web service applications and service oriented architectures.
In this role, the selected candidate will analyze issues, facts and available information to develop logical solutions; researching inconsistencies found in data; drawing correct inferences from information and making recommendations that support business decisions.
This role is responsible for designing, building and tuning log storage solutions that support a variety of security intelligence tools. Testing, monitoring, and alerting of a distributed storage systems.