In this role, you will be responsible for
computer systems technical support in a Laboratory environment comprised of Linux, MS Windows, Sun Solaris and UNIX based real-time simulation and development systems, including software development, systems integration, operations and maintenance in a classified environment.
The Information Security Analyst will work with senior security engineers and management while sharing responsibility of supporting and maintaining security tools, processes and procedures within SaaS Datacenters that ensure the confidentiality, integrity, and availability of infrastructure and application operations.
The Enterprise Security Engineer II is the highest-level technical resource for information security within the organization, and provides support in the development, implementation and assurance of technical security strategies across the enterprise.
The primary function of this position is for the development of sophisticated solutions for various initiatives and projects the IT applications department will undertake using Big Data technologies and related platforms.
As an IT Specialist you will provide increased transparency and effective communication to partners related to Information Security and Business Continuity controls resulting in increased risk awareness and support of risk assessment activities.
The successful candidate must have a proven experience with Linux and UNIX and will be able to provide examples of how he or she has used automation to create efficiencies and integrate with APIs to connect tools and enhance functionality.
Performs special projects and participates as a technical advisor for a variety of ad-hoc information security and logical user access projects that will be dictated by current business and technological developments.
In this role, the selected candidate will assist in the review, development, testing and implementation of security plans, products and control techniques; coordinate the reporting data security incidents.
In this role, you will be responsible for understand the structures, usage and sources of business data as well as the context in which it is utilized throughout the business, and be able to design and build these structures.
Provide project and implementation management for security projects and security tools; serve as a hands-on technical expert working directly with delivery teams to provide guidance and ensure solutions adhere to security policy and best practices.