$100K - $150K(Ladders Estimates)
Thank you for your interest in a career at Regions. At Regions, we believe associates deserve more than just a job. We believe in offering performance-driven individuals a place where they can build a career --- a place to expect more opportunities. If you are focused on results, dedicated to quality, strength and integrity, and possess the drive to succeed, then we are your employer of choice.
Regions is dedicated to taking appropriate steps to safeguard and protect private and personally identifiable information you submit. The information that you submit will be collected and reviewed by associates, consultants, and vendors of Regions in order to evaluate your qualifications and experience for job opportunities and will not be used for marketing purposes, sold, or shared outside of Regions unless required by law. Such information will be stored for a set period of time. You may review, modify, or update your information by visiting and logging into the careers section of the system.
At Regions, the Cyber Security Engineer manages the day-to-day maintenance and operation of Information Security Systems to ensure that controls are adequate and effective. This position also analyzes scenarios, provides solutions, and makes recommendations to protect the environment, customers, and employees. May supervise other Cybersecurity Engineers or lead large scale projects.
This position is exempt from timekeeping requirements under the Fair Labor Standards Act and is not eligible for overtime pay.
Skills and Competencies
Database Security Engineer
Security / Finance
Regions is seeking a highly motivated, well organized Database Security Engineer to join their expanding Data Protection team in a fast paced, team-oriented environment.
The Database Security Engineer will assist in the design, implementation, maintenance and support of industry leading database security DAM and encryption products. This position will also be responsible for reporting and data analysis to support compliance and audit initiatives. Candidate should have proven experience implementing best practice security policies based on risk prioritization and will continue to expand the detection capabilities of activity monitoring technologies.
Valid Through: 2019-10-14