The point where experts and best companies meet
Share
Regular or Temporary:
English (Required)
1st shift (United States of America)Responsible for developing and maintaining the technical IT / cyber security capabilities necessary for safeguarding the firm's information systems and applications (software development lifecycle), including every phase of the SDLC and software stack. Design, plan, test and implement phases of cybersecurity technology projects.
Essential Duties and Responsibilities
Following is a summary of the essential functions for this job. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.
1. Develop and maintain the technical IT/cyber capabilities including all phases of the software development lifecycle and software stack which includes threat modeling of application designs, static application security testing (SAST), software composition analysis (SCA), dynamic application security testing (DAST), and penetration testing.
2. Lead efforts related to designing, planning, enhancing, and testing all cybersecurity technologies used throughout the enterprise including base-lining current systems, trend analysis, and capacity planning as required for future systems requirements and new technologies.
3. Analyze information to determine, recommend, and plan the use of new information security technologies, or modifications to existing equipment and systems that will provide capability for proposed project or work load, efficient operation and effective use of allotted resources
4. Lead the implementation of new information security technologies or integration of existing technologies including initial configuration, installation, change management, and operational handoff
5. Use sophisticated analytical thought through models, testing, and experience to exercise judgment and identify innovative solutions.
6. Responsible for technical support of information security technologies providing expert problem analysis and resolution in a timely manner
7. Leads teams or projects with moderate resource requirements, risk, and complexity.
Required Qualifications:
The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
1. Bachelor’s degree and eight years of experience in systems engineering or administration or an equivalent combination of education and work experience
2. Deep specialized and/or broad functional knowledge in applied enterprise information security technologies including but not limited to firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering, and Mainframe security
3. Previous experience in leading complex IT projects
Preferred Qualifications:
1. Master’s degree or MBA and ten years of experience or an equivalent combination of education and work experience.
2. Banking or financial services experience.
3. Other security certifications (e.g. CCNA Security, GSEC, GCED, GPPA, etc.)
4. Other technical Certifications (e.g. CCNA, RHCE, MCSE, etc.)
5.Certification in Information Security Management (e.g. Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC) or Certified Information Security Manager (CISM)), or related security certification(s)
Visual / Audio / Speaking
Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.
Manual Dexterity / Keyboarding
Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.
Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need
These jobs might be a good fit