The IT Security Engineers role will be creating, managing and enforcing corporate IT security policies and procedures that meet or exceed our client's industry best practices and are in compliance with PCI and HIPAA regulations.
Participates in the development of technology solutions which implement standards and performance requirements to maximize reliability, functionality, and integrity while minimizing costs and cycle time.
Facilitate awareness communications to various audiences, coordinate, and maintain project schedules, plans, and scope using standard project management methodologies. Assist with documenting security policies, standards, and guidelines based on the organization's requirements, maturity level, and compliance objectives.
The Information Security Engineer creates and maintains the technologies/processes used by Information Security Analysts to perform their everyday functions. Ideal applicants are detail-oriented, love to take risks and will constantly challenge assumptions.
The Software Test Engineer defines software test strategy, test metrics and industry standard reports leveraging standard tools to design and develop software with sound, repeatable, industry best practices and in accordance with software development process.
The Information Security Analyst II will support the college information security program to ensure secured electronic systems architecture and functionality and safeguarding all confidential, proprietary, privileged and protected information assets.
The Information Security Architect is the forward-looking rock star who knows, intuitively, where the puck is going and can put us in the right spot. The Architect works with various areas of the business to collaborate on strategy, help design secure solutions.
The selected Consultant will work closely with the designated Clients OISP CISO and their staff, Clients ITO Chiefs and supervisors, and the OIT security group to address Clients IT security and to ensure all Clients IT related security issues are addressed.
The Application Developer will focus on the developing, producing, implementing, documenting, maintaining, and supporting systems, purchased technology solutions, and/or operating systems and related software.
Support daily operations for the ZF User Management (ZUM) group across Region North America; this group supports the ZF User Management and Information Protection guidelines and principles through management of user accounts, as well as access and authorization rights.
The Software Security Architect is primarily responsible for interacting with development teams, other Software Architects and the business to help define how the business should develop secure solutions.