The point where experts and best companies meet
Share
Regular or Temporary:
English (Required)
1st shift (United States of America)Responsible for developing and maintaining the technical IT/cyber security capabilities necessary for safeguarding the firm's information systems and applications (software development lifecycle), including every phase of the SDLC and software stack. Assist in the designing, planning, testing and implementation phases of cybersecurity technology projects.
Essential Duties and Responsibilities
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
1. Develop andthe technical IT/cyber capabilities including all build andphases of the Security Information and Event ManagementSIEM)such as Splunk, Sentinel,
in efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used throughout the enterprise including base-lining current systems, trend analysis, and capacity planning asfor future systems requirements andnew technologies
in the analysis of information to, recommend, and plan the use ofnew technologies, or modifications to existing equipment and systems that will provide capability for proposed project orwork load, efficient operation and effective use of allotted resources
in the implementation ofnew informationsecurity technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff
5. Take a new perspective on existing solutions to solve complex problems and exercise judgment based on the analysis (modeling, testing, etc.) of multiple sources of information.
6. Provide technical support of information security technologies, providing problem analysis and resolutionin a timely mannerand explain and interpret complex, difficult, or sensitive information
7. Lead small cybersecurity projects with manageable risks and resource requirements; plays significant roles in larger, more complex initiatives.
Required Qualifications:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
1. Bachelor's degree in business administration, technology related field or equivalent education and related training
2. More than seven years of demonstrated progressive experience in Cybersecurity, with emphasis on data lost prevention, vulnerability management, access management, firewalls, security awareness training, etc.
4. Strong working knowledge of cybersecurity terms, concepts, disciplines, frameworks, best practices and industry/regulatory requirements
Preferred Qualifications:
degree and five years of experience in systems engineering or administration or an equivalent combination of education and work experience
2. In-depth knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security
experience in planning and managing IT projects
degree and six years of experience or an equivalent combination of education and work experience
5. Banking or financial services experience
6. Experience creating build definitions. Experience with setting up branching approach, defining merging approach. Experience supporting configuration of automated unit testing. Experience supporting configuration of build package, providing oversight when a build is checked-in into the CI server, handling build dependency impediments raised by the team. Experience managing the build process for multiple
Visual / Audio / Speaking
Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.
Manual Dexterity / Keyboarding
Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.
Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need
These jobs might be a good fit