Job Description :


Network Management & Operational Support:

  • Performing security assessments; including (but not limited to): analyzing a client’s entire environment including the employees, processes, & technologies, then creating a report that includes an executive summary, risk matrix and security roadmap
  • Writing reports and delivering these to clients
  • Creating follow-up plans for clients based on the results of the security assessment

Minimum experience:

  • At least 2 years with implementing information security best practices, and at least 5 years in a technical role. Application or infrastructure security is a must; both is a big bonus
  • Defining security controls for a company's Engineering organization
  • Secure development lifecycle management
  • Threat modeling and security kill chains
  • A foundation and in-depth technical knowledge of security engineering, authentication (especially SSO and MFA), and communication protocols
  • Securing IT assets such as laptop computers
  • Code library, software, and operating system patching
  • A comprehensive understanding of web application architecture
  • Security in cloud environments such as AWS, and across SAAS products
  • Training others in security best practices
  • Past contributions to the security community
  • The financial services industry, or another similarly-regulated industry (e.g., healthcare). Experience with encryption solutions for data at rest and in transit
  • Experience with encryption solutions for data at rest and in transit
  • Experience with Database TDE encryption for Oracle, SQL Server, and other
  • In-depth understanding of encryption key management and ciphers
  • In-depth understanding of operational monitoring and alerting
  • Conceptual understanding of networks, firewalls and subnets
  • CISSP certification desired

Knowledge, Skills, and Abilities:

  • Building strong relationships across Human Interest, being an advocate of security best practices
  • Defining security controls around code and infrastructure deployments
  • Conducting product design reviews
  • Conducting moderately sophisticated penetration tests
  • Training engineers on security best practices
  • Offering your expertise to other specialists in the designing and building of secure software across our business.
  • Able to follow and update documented operations procedures
  • Excellent written and verbal communications skills
  • Able to work and communicate across multiple departments
  • Ability to work as part of a team

Similar Jobs you may be interested in ..