Job Description :
Job Description:
  • Design and maintenance of integrations into cloud paltofrms using terraform and API's.
  • SOAR Intefration
  • Scripting and basic programming (Phython)
  • Proactively protect the availability, confidentiality, and integrity of customer, employee, and business information
  • Proactively manage, monitor, and support enterprise network and systems security controls and services
  • Responsible for understanding business security needs and incorporating them into the overall Information Security Program, including the development of the supporting policy and processes
  • Participate in security incident response team activities, coordinating tactical risk mitigation to incidents
  • Ensure that security program, tools and processes support the business goals while maintaining a highly satisfactory and efficient end user experience
  • Participate in the tactical and operational planning of vulnerability assessment activities, including threat management monitoring and mitigation response
  • Understand business processes, technology requirements and new initiatives and build consensus on security risks and appropriate controls.
  • Perform change control and device configuration management activities on all security systems – esp[eically cloud based
  • Bachelor degree in Information Technology plus 5 years of infrastructure and operations experience, 2 or more years with a focus on information security
  • Possess or be working toward certification(s) (CISSP, CCNA Security, etc.)
  • Must have working knowledge of security techniques and controls utilized across various technologies and technical environments including but not limited to:
    • Cloud security (Azure and GCP)
    • Desktop, server operating systems, and SCADA controls
    • Application, E-Commerce, and website security controls
    • Infrastructure protective controls, including firewalls and network access
    • System authentication, authorization and accounting frameworks
    • Security awareness and education programs
    • Security monitoring, analytics, and SIEM tools
  • Must also have a mature understanding of tools and techniques used by hackers
  • Demonstrated ability and desire to stay current on new and emerging security threats along with new protective techniques and technologies
  • Available on an on-call basis when needed
  • Available for off-hours work on a scheduled basis
  • Ability to set short range plans and adjust direction as needed
  • Excellent communication, customer service, problem solving and analytical skills