Vacancy expired!
- 8+ years of information technology experience required.
- 5+ specialized years in an information security role
- 5+ years of active directory / LDAP / identity access and management experience; preferably with a major identity platform (i.e. Okta, MSFT, CyberArk)
- 5+ years of experience in the configuration, testing, deployment and management of enterprise security software technologies.
- 5+ years’ experience with major operating systems; including but not limited to Windows Server (2012 – 2019) & Desktop (8 /10 /11), Linux (Ubuntu, Red Hat).
- Advanced, hands-on experience managing IDS / IPS, EDR / anti-malware, vulnerability management, firewall tooling.
- At least 3 years’ experience managing, supporting an AWS or Azure cloud infrastructure; ideally as a security practitioner.
- Palo Alto, Splunk, McAfee, Darktrace, Cisco Umbrella, Bromium, Linux, Windows, AWS, Azure.
- Strong understanding of the principles relevant to confidentiality, integrity, availability, authentication and non-repudiation.
- Strong understanding of anti-malware platforms: management triage and incident response.
- Strong understanding of network protocols and experience with packet capture analysis.
- Knowledge of cloud technologies; including security services offered via the cloud (AWS, Azure).
- Strong knowledge of the indicators of compromise and what constitutes a targeted cyber-attack.
- Knowledge of DLP (Data Loss Prevention) technologies.
- Knowledge of web filtering and proxy technologies.
- Knowledge of vulnerability management best practices.
- Knowledge of common scripting languages such as, VB, Python, Powershell, BASH, & Perl
- Knowledge of incident response and handling protocols and methodologies.
- Excellent analytical and communication skills.
- Self-starter & team player.
- A college or university degree and / or relevant work experience in the area of information security is required.
- Professional Certifications such as CISSP, CISA, CISM, GCCC, GCED, GPPA.
- Use technical knowledge of current attacks to identify flaws and weaknesses in the composition and design of networks, remote access schemes, systems and applications to specify solutions, verify the solutions that have been implemented, and rapidly adjust designs based on new threat and attack information as acquired
- Provide engineering support for all preventative and detective security technologies such as: malware detection, network access controls, web/email content filtering, SIEM response, intrusion detection and vulnerability management.
- Design, communicate and deploy information security project deliverables on time, and to required quality to support service-based security goals.
- Determine security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues.
- Define requirements and prototype solutions to support the enterprise information security roadmap.
- Partner with the service delivery team to support the communication, deployment, and ongoing resolution of issues associated with security technologies and security incidents.
- Partner with enterprise architecture, development, IT and business stakeholders to consult on broader firm wide initiatives that require security consulting expertise.
Vacancy expired!