Working independently, in a Lead role, as an escalation-point and/or with cross-functional teams regarding high-impact cyber security solutions, engineer, build, and maintain enterprise security solutions that incorporate best practices for systems design, engineering and architecture of supported platforms.
Responsible for design, deployment, and ongoing maintenance of Information Security & Risk Management platforms and controls including perimeter, cloud, data, network, application security, automation/orchestration, and endpoint security. Engage with the business to provide advanced subject matter expertise and consultancy for IT Security controls. Designs and advocates the adoption of new security technologies and solutions to support emerging enterprise business and customer needs. Works to achieve strategic and operational targets with significant impact on the IT Security Engineering results. Creates and maintains enterprise security engineering designs. Implements strategic goals established by Information Security & Risk Management leadership.
Responsible for entire projects / programs or processes as Industry knowledgeable lead within IT Security Engineering. Responsible for providing security guidance, coaching and training to other employees across the company across a broad area of expertise. Provide support, advice and advocacy to Security teams on technical solutions; resolving issues and finding options to meet new business requirements.
Strongly desire direct experience supporting and maintaining one or more of the following products/activities: Database Activity Monitoring; Archer development; Endpoint Protection products; administration of Microsoft Azure Security and Compliance; Endpoint detection and response (EDR); Security Orchestration, Automation and Response (SOAR).
Degree in Computer Science or Engineering or related field with a minimum of 7 years dedicated to IT, IT security, and/or security engineering/architecture experience OR a combination of equivalent work experience and education. Broad knowledge of information assurance (IA) principles and organizational requirements that are relevant to confidentiality, integrity, and availability of data.
Certifications which demonstrate baseline competency in the areas of IT Security or related field.
Must have direct experience supporting and maintaining one or more of the following products/activities:
Database Activity Monitoring products, IBM Guardium, Imperva.
Email Protection products, Proofpoint, Agari.
Vulnerability Management: Tenable, Rapid 7 and Tripwire