In this role, the selected candidate will work closely with solution architects to assist; support and review system and technical design documents to ensure functional and business requirements are met.
In this role, the selected candidate will be working within the threat management team and responsible for examining security events for context, relevance, criticality and their potential impact to the company.
In this role, the selected candidate will be responsible for providing support to Client authentication, host and application security services; day to day alerts, incidents and request handling and response in the production environment based on customer requirements.
In this role, you will be installing, implementing, administering, monitoring, and maintaining all security architecture technology solutions including vulnerability management tools, Intrusion detection, and external scanning.
In this role, you will be responsible to develops and maintains appropriate knowledge of best practices, tools and processes for the design and deployment of custom public-facing web applications, mobile applications, collaboration platforms, and integration / interoperability of those technologies with enterprise business systems (sap/ps).
In this role, you will perform information security risk assessments of information technology assets based on the NIST framework. Provide information security subject matter expertise to several teams and business customers on risk assessments, vulnerability remediation, and threat detection techniques.
In this role, you must have the ability to establish and maintain excellent working relationships/partnerships with the cyber security and infrastructure support teams throughout the Information Technology organization, as well as business units.
In this role, you will develop consistent programming standards for all java development local related web architecture. Document system design and standards. Engage with stakeholders to assess, resolve, and execute work requests.
In this role, you will lead all physical access control software administrative operations, providing support to software application end-user population; analyze gaps in data quality; recommend and execute automated and manual remediation of discovered gaps.