100-year history of dedication to customer satisfaction, success and growth
Tremendous growth and new business strategy leading to the need for new talent
Significant investments in cutting-edge technology
WHAT THEY OFFER YOU:
Culture: Excellent work environment that fosters collaboration
Growth: Ability to make an impact on the direction of the organization
Opportunity: Gain hands-on experience working with cutting-edge technology
Stability: Recent financial performance of the company has reported record profits
WHY THIS ROLE IS IMPORTANT:
Providing operations and engineering support for critical security systems and services including servers, endpoint security, computer forensics, vulnerability/penetration assessment/mitigation, and security event management.
Assists with executing vulnerability analysis and exploitation of applications, operating systems, and networks.
Designing security models, reviewing, and approving security configuration and installation of firewall, VPN, routers, IDS scanning technologies, and servers.
Works to identify intrusion or incident path or method through testing and evaluation procedures.
Overseeing security awareness programs; educating and communicating to staff about information security polices, procedures, and practices.
Helps design, develop, and implement countermeasures, systems integration, and tools specific to cyber and information operations.
Monitoring industry security updates, technologies, and best practices to improve security management.
Learns how to resolve malware and intrusion issues within the system as they occur.
Participating in the development of hardware/software/network security procedures and guidelines that support information security policies.
Follows industry security updates, technologies, and practices on a continual basis to improve overall security management.
Helps serve as an internal information security consultant on the standards, complex issues, and best practices for the organization.
Contributes to the testing and analysis of complex software systems to determine both the functionality and intent of the systems.
Assists with maintaining operational and configuration documentation and creates and maintains diagrams.
Learns from and works with Cybersecurity Risk and Security Operation teams to enhance the overall security posture of the enterprise.
THE BACKGROUND THAT FITS Required Skills:
2+ years of previous experience
Ability to use threat intel sources to determine what affects the company and what the company should be prioritizing and communicating out.
Ability to identify threats and work with the patching/remediation team to prioritize what should be fixed first, and what mitigating/compensating controls we have.
Previous experience with brand
Security certifications (SEC+, CISSP, CEH, etc) a plus