Responsibilities & Duties
Monitors and manages cybersecurity tools to protect the organization’s technology and digital assets.
Continuously assess the organization’s systems, networks, and data to determine what types of security defenses are necessary.
Actively contributes feedback pertaining to the secure configuration of information systems.
Contributes to the development and maintenance of the Identity and Access Management (IAM) architecture and standards.
Acts with a sense of urgency when responding to incidents and vulnerabilities.
Expands their security knowledge and experience in technologies and methodologies as it relates to IAM technologies, Security Information and Event Management (SIEM) devices, firewalls, proxies, access controls, encryption, networking, scripting, auditing, vulnerability assessments, IDS IPS and operations. Additionally, to assist with effective research, data gathering, analysis, metrics reporting and communications.
Actively manages technology security environment, including evaluation user access provisioning and de-provisioning processes and reporting.
Responds to any security breaches or intrusions that may occur.
Conducts scans and testing to identify any vulnerabilities and manage remediation efforts.
Assists with investigations to determine how security breaches happened.
Reports findings and provides security recommendations to management.
Implements, and updates as needed, technology processes and procedures that are critical to the organization.
Manage outsourced security-related vendors.
Is sometimes on-call for after-hours support.
Bachelor’s degree related to Computer Science, Business or Information Systems preferred or equivalent experience
CompTIA Security+, CISSP, SSCP, or CISM certifications are preferred.
3+ years working with cybersecurity efforts including:
Monitoring a SIEM
Administering End Point protection products
3+ years’ experience monitoring, administering and supporting complex environments.
Good working knowledge of applicable cybersecurity tools
Ability to set and change priorities amongst multiple competing constituencies.
Familiarity with NIST and CIS concepts and best practices.
OS: Windows Server, Linux
Web Technologies: Web Services and Load Balancing
Performance and measurement: Security monitoring tools SIEM
Security and compliance: IDS IPS, VPN, Encryption. PII, SOX
Other Technologies: MDM, MFA, etc.
REMOTE WORK ELIGIBLE Yes
May 24, 2021