The point where experts and best companies meet
Share
This role will play a central governance and oversight authority in cryptographic key management activities, ensuring the security of cryptographic keys and systems throughout their lifecycle as well as participating in active directory provisioning and projects.
The Specialist will be responsible for maintaining compliance with company, industry, and regulatory requirements related to cryptographic key management. In addition, this role may involve some on-call rotation and implementation projects that may require work outside of normal working hours.
Responsibilities:
Document security policies and procedures, ensuring comprehensive coverage of security-related activities and requirements.
Support risk assessment and data security procedures and products by providing implementation support and ensuring their effectiveness.
Evaluate new and proposed security systems and technologies, staying updated with industry advancements and best practices.
Support Active Directory provisioning and support projects
Collaborate with the Enterprise Key Management to maintain the security of cryptographic keys and systems.
Monitor and document key management lifecycle events in accordance with internal policies, Elavon, and industry regulations.
Work closely with cross-functional teams to ensure compliance with company and industry requirements related to cryptographic key management.
Participate in on-call rotations and implementation projects that may involve work outside normal working hours.
Basic Qualifications
Bachelor's degree or equivalent work experience
Working experience in active directory including creating ad objects, understanding, least privilege security principals, DFS and folder permissions, powershell, excel, and basic server management.
Experience in Cryptographic Key Management (highly preferred - not essential)
Working knowledge and experience of regulatory requirements in the Payments and Banking Industry (PCI)
At least 4-5 years of experience with the processes, tools, techniques and practices for assuring adherence to quality standards associated with developing, enhancing and operationalizing application systems and databases
Basic understanding of cryptographic keys and their respective Hardware Security Modules (HSMs)
Excellent organizational skills and a proven ability to write technical documentation effectively. Detailed project management skills
Ability to communicate clearly; orally and written, with all levels of staff
:
These jobs might be a good fit