Job Description: - Design and maintenance of integrations into cloud paltofrms using terraform and API's.
- SOAR Intefration
- Scripting and basic programming (Phython)
- Proactively protect the availability, confidentiality, and integrity of customer, employee, and business information
- Proactively manage, monitor, and support enterprise network and systems security controls and services
- Responsible for understanding business security needs and incorporating them into the overall Information Security Program, including the development of the supporting policy and processes
- Participate in security incident response team activities, coordinating tactical risk mitigation to incidents
- Ensure that security program, tools and processes support the business goals while maintaining a highly satisfactory and efficient end user experience
- Participate in the tactical and operational planning of vulnerability assessment activities, including threat management monitoring and mitigation response
- Understand business processes, technology requirements and new initiatives and build consensus on security risks and appropriate controls.
- Perform change control and device configuration management activities on all security systems – esp[eically cloud based
QUALIFICATIONS - Bachelor degree in Information Technology plus 5 years of infrastructure and operations experience, 2 or more years with a focus on information security
- Possess or be working toward certification(s) (CISSP, CCNA Security, etc.)
- Must have working knowledge of security techniques and controls utilized across various technologies and technical environments including but not limited to:
- Cloud security (Azure and GCP)
- Desktop, server operating systems, and SCADA controls
- Application, E-Commerce, and website security controls
- Infrastructure protective controls, including firewalls and network access
- System authentication, authorization and accounting frameworks
- Security awareness and education programs
- Security monitoring, analytics, and SIEM tools
- Must also have a mature understanding of tools and techniques used by hackers
- Demonstrated ability and desire to stay current on new and emerging security threats along with new protective techniques and technologies
- Available on an on-call basis when needed
- Available for off-hours work on a scheduled basis
- Ability to set short range plans and adjust direction as needed
- Excellent communication, customer service, problem solving and analytical skills
|