Job Description :
Ideally they want the candidate to have all of the skills below, but if they have 3 or 4 out of 5 and are really good with 3 or 4 we can send them.

Investigation skill on email attacks
Knowledge of email filtering (SPF, DKIM, DMAR, MX ……
Vendor security research
User awareness training
Project Management Knowledge

Position Purpose:

This purpose of this position is to apply security best practices to protect computer assets by establishing and enforcing system access controls; maintaining disaster preparedness. Liaise with business stakeholders, vendors, and all information technology departments to ensure technical implementation strategy is set, understood, and executed.

Client is seeking an individual to assume responsibility for information security development and maintenance; design of security education, training, and awareness activities; monitoring compliance with Client IT security policy and applicable law; and coordinating investigation and reporting of security incidents.

Primary Accountabilities:

1. All duties as assigned to achieve Client goals and objectives.
2. Monitor Client for security breaches or security anomalies and investigate these situations and take appropriate actions including communication to IT management and isolation or corrective actions to secure the environment.
3. Prepare reports that document security breaches and the extent of the damage caused by the breaches.
4. Monitor penetration testing for software, hardware and human risks and document / escalate findings.
5. Develop and publish Information Security standards and guidelines based on knowledge of best practices and compliance requirements.
6. Research the latest information technology (IT) security trends.
7. Recommend security enhancements to business stakeholders, vendors, and all information technology departments.
8. Assist Client user community and vendors regarding security products, policies and procedures utilized within the environment.
9. Develops, manage, and maintain security awareness by providing orientation, educational programs, and on-going communication.
10. Prepares IT documentation, including department policies and procedures, informational notifications, and IT alerts.
11. Updates your job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations.
12. Engage with Enterprise IT and SBU development team to ensure implementation of new technology solution or enhancement to existing systems does not create new risks to the environment
13. Perform other related duties as assigned.

Internal Relationships:
Has contact with all Client departments.

External Relationships:
Has contact with all Vendor-Client interaction and to complete projects for Client usage.

Required Qualifications:
1. Bachelor’s degree in Computer Science or equivalent.
2. 3 to 6 years of experience in the IT security field. Skills might include:
a. Identity and access management (IAM) solutions
b. Endpoint protection technologies and techniques
c. Web application firewalls and intrusion prevention
d. encryption
e. Access control methodologies (MAC, DAC. RBAC)
f. IDS/IPS systems, SIEM tools and network scanners
3. 3 to 6 years of experience in a project managing security projects.
4. 5 years of experience working with a global team including offshore/ outsourced employees.
5. 3 to 6 years in investigated / forensic work in emails and end user devices.
6. Must continually adapt to stay a step ahead of cyber attackers. Must stay up to date on the latest methods attackers are using to infiltrate computer systems and on IT security. Will need to research new security technology to decide what will most effectively protect Client.
7. Ability to understand business requirements and balance technical excellence with business constraints such as time to market, cost & schedule. Ability to understand the long-term (“big picture”) and short-term perspectives. Ability to quickly comprehend the functions and capabilities of new technologies. Good understanding of technology trends and Technical vision.
8. Experience should include project management, developing process and procures, security education, network penetration testing, application vulnerability assessments, risk analysis and compliance testing.
9. Security certifications desired in: one or more of the following:
a. Certified Information Systems Security Professional (CISSP)
b. Certified Information Security Manager (CISM)
c. Certified Information Systems Auditor (CISA)
d. Certified in Risk and Information Systems Control
e. Global Information Assurance Certification
f. Vendor credentials offered by companies such as Microsoft and Cisco.
10. Knowledge of information security standards (e.g., ISO 17799/27002, etc, rules and regulations related to information security and data confidentiality and server, application, database, network security principles for risk identification and analysis.
11. Strong analytical and problem solving skills.
12. Excellent communication (oral, written, presentation), interpersonal, ability to interact and dialogue to arrive at an optimal IT solution to business problems.
13. This position requires some weekend and evening assignments as well as availability during off-hours for participation in scheduled and unscheduled activities.

Software used at Client for this position
Active Directory
Alert Logic – Event Log storage
Center Point for Share Point
Commvault
Footprints – Ticketing system
F-secure – Anti Virus
Knowbe4 – Phishing campaigns
Manage Engine – Ad Audit, Ad Manager, Password Manager
MS Office 2010
MS Project
MS VISIO
Nipper – Firewall analyzer
Office365
Proof Point – Email security & Protection
Proof Point – TAP (Targeted Attack Protection)
Solar Winds – Net Flow Traffic Analyzer
Solar Winds – Network Configuration Manager
Symantec – Anti Virus
Tenable. IO – Nessus scanner
Time Watch – Time reporting
TrendMicro Scan mail for Exchange (Anti-Virus tool)
Webex - Cisco