Information Security Consultant

Total System Services   •  

Tempe, AZ

Industry: Agriculture & Natural Resources


8 - 10 years

Posted 293 days ago

This job is no longer available.

Summary of This Role

You will be joining a team that provides System Information and Event Management (SIEM) to a 24/7 Threat Management Center/Security Operations Center that protects a global payment processor from malicious cyber actors.  We’re looking for a Python or JavaScript expert who loves to create visually stunning applications that help analysts makes sense of the volumes of data available to them while also helping to execute routine functions in an automated fashion.  Certification in industry-standard SIEM tools is a must (Splunk/ArcSight/LINK).  Any new-hire will provide day-to-day automation support for the Cyber Security Division – writing custom code and scripts to increase productivity and improve situational awareness for the whole team.  Experience with implementing Security Automation and Orchestration (SAO) tools such as Demisto, Phantom, or Swimlane are a major plus.  Proficiency in creating REGEX code is also a plus.

Evaluates, tests, recommends, develops, coordinates, monitors, and maintains information security policies, procedures and systems, including hardware, firmware and software . Ensures that IS security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS security . Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents. Investigates and resolves security incidents and recommends enhancements to improve security. Develops techniques and procedures for conducting IS security risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents.

What Part Will You Play?

  • Research monitoring of complex systems and response to known and emerging threats against the TSYS network via intrusion detection software
  • Manages detailed, comprehensive investigation of security issues by reviewing the results of work of Analysts I, II, Senior and/or Specialist on analyzing security log data, interpreting data in support of security event management process from various data feeds and triaging on a wide variety of security events.
  • Consults on incident handling process which includes implementation of containment, protection and remediation activities.
  • Mentors on new and emerging threats that can affect the organization's information assets, researches the third party software/solutions, IT configuration changes (including access control requests), and network/system architecture from risk perspective, and provides appropriate direction.
  • Responsible for the design and configuration of security systems, including proxy, remote access, mail gateway, intrusion prevention, wireless networking, data leak prevention, security information and event management and web application firewalls.
  • Mentors on assessing and disseminating threats related to the enterprise in regard to current vulnerability, on managing and developing an emerging threat model.
  • Consults on relationships to risks based on changes to implementation of ISO(
    International Organization for Standardization)/BSO(Business Services Online); counsels on PCI(Payment Card Industry)/Logical Security guidelines and models, HIPPA(health insurance portability and accountability act), PII(Personally Identifiable Information ), and Card personalization.
  • Oversights cost effective solutions for system/application development regarding Information Security processes and concepts in applicable systems and software.
  • Acts as the subject matter expert on Information Security functions pertaining to computer access control on numerous security software products and processes. Researches and stays current on the latest trends, best practices, and technology developments
  • Understands business objectives and provides direction based on best practices, risk, Corporate Policy, and association and regulatory guidelines.
  • Researches and implements the long term strategies for conducting system penetration, vulnerability and web application testing, risk assessments, policy creation.

What Are We Looking For in This Role?

Minimum Qualifications

  • Bachelor's Degree
  • Relevant Experience or Degree in: Bachelor's degree in Computer Science, Info Security, or related field. Or relevant work experience.
  • Typically Minimum 8+ Years Relevant Exp
  • Including network operations or engineering or system administration on Unix, Linux, MAC(Message Authentication Code), or Windows; proven experience working with security operations, intrusion detection systems, Security Incident Even Management systems, and anti-virus collection logs; including knowledge of industry standard security compliance programs((PCI(Payment Card Industry), SOX(Sarbanes-Oxley) , GLBA(Gramm Leach Bliley Act)), etc.). Knowledge of industry standard security compliance programs ((PCI(Payment Card Industry), SOX(Sarbanes-Oxley) , GLBA(Gramm Leach Bliley Act), etc.)

Preferred Qualifications

  • Professional certifications CISSP(Certified Information System Security Professional),CISM(Certified Information Security Manager) ,CISA(Certified-Information-Systems-Auditor),GSEC(GIAC Security Essentials) ,Network +,Security +