המקום בו המומחים והחברות הטובות ביותר נפגשים
Regular or Temporary:
English (Required)
1st shift (United States of America)Please review the following job description:Responsible for developing and maintaining the technical IT/cyber security capabilities necessary for safeguarding the firm's information systems and applications (software development lifecycle), including every phase of the SDLC and software stack. Assist in the designing, planning, testing and implementation phases of cybersecurity technology projects.
Essential Duties and Responsibilities:Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
Develop and maintain the technical IT/cyber capabilities including all phases of the software development lifecycle and software stack which includes threat modeling of application designs, static application security testing (SAST), software composition analysis (SCA), dynamic application security testing (DAST), and penetration testing.
Participate in efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used throughout the enterprise including base-lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies.
Participate in the analysis of information to determine, recommend, and plan the use of new technologies, or modifications to existing equipment and systems that will provide capability for proposed project or work load, efficient operation and effective use of allotted resources
Participate in the implementation of new information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff
Take a new perspective on existing solutions to solve complex problems and exercise judgment based on the analysis (e.g. modeling, testing, etc.) of multiple sources of information.
Provide technical support of information security technologies, providing problem analysis and resolution in a timely manner and explain and interpret complex, difficult, or sensitive information.
Collaborating with other teams to integrate IAM systems with other security tools and technologies.
Plan and live deployment of application with IGA solutions including onboarding.
Understand lifecycle management process & familiar with joiner/mover/leaver workflow.
Required Qualifications:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Bachelor’s degree and five years of experience in systems engineering or administration or an equivalent combination of education and work experience
In-depth knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security
Previous experience in planning and managing IT projects.
Preferred Qualifications:
Bachelor’s degree and six years of experience or an equivalent combination of education and work experience
Comprehensive knowledge of identity and access management best practices, procedures, and software solutions such as Oracle Identity Governance, SailPoint, Saviynt.
Understanding of Connector bundles, IAM Attestation and SOD Implementation.
Experience with Windows, Linux/ Unix, scripting (Bash, PowerShell, or Perl), LDAP, Oracle, MS SQL.
Experience supporting configuration of build package, providing oversight when a build is checked-in into the CI server, handling build dependency impediments raised by the team. Experience managing the build process for multiple releases.
Understanding of relational databases, Operating Systems & application/web servers.
משרות נוספות שיכולות לעניין אותך