Posted: February 28th, 2017
Location: Columbus, GA
Pay Range: $80,000-$120,000
There are 4 openings for Vulnerability Remediation Security Engineers. Relocation assistance can be provided.
The Security Engineers will provide professional support for major components of the company’s information security program. They are responsible for supporting the technical analysis, design consulting and product review of security components. The will lead the identification of new tools and techniques. Evaluate and assesse existing technical issues by researching and identifying innovative solutions to broad and complex information security challenges. Manage components of various projects to completion, consulting with various corporate teams, both within the IT and business environments to define information security solutions.
Job Duties and Responsibilities:
■ Provide leadership to the development and implementation of security architecture, standards, procedures and guidelines for multiple platforms in diverse system environments. Ensures that security concerns are addressed and mitigated and that are appropriate standards are defined and published.
■ Often drives the evaluation, testing and implementation of emerging technologies, information systems security issues. Presents proposed security enhancements to management for approval, funding and implementation.
■ Perform security assessments and review networking initiatives for security compliance. Prepare status reports and "informational" metrics on security matters; develop security risk analysis scenarios and response procedures.
■ Serve as a resource regarding the security of data networks and centralized data frameworks, to include coordinating activities with the business unit, users and external networks.
■ Robust operational knowledge of the TCP/IP stack, network protocols, network topology and architecture, Windows and Unix operating systems, system logs events, anti-virus technologies, authentication systems (AD, LDAP, RADIUS, RACF), DNS, DHCP, SNMP, NetFlow, IP and application development processes/lifecycles
■ Provide input into the design, implementation, and maintenance of the information security architecture. Analyze, review, and determine the technical requirements necessary to mitigate the security risk for Information Technology needs, plans, and initiatives.
■ Implement and maintain required security tools. Investigate information security violations; monitor and communicate technical vulnerabilities.
■ Recognize and identify potential areas where existing security policies and procedures require change, or where new ones need to be developed. Conduct risk assessments and security briefings; advise management of critical issues.
■ Evaluate products and/or procedures to enhance productivity and effectiveness. Provide direct support to the company and IT staff for security related issues. Coordinate security awareness programs and provide education on security policies and practices. Provide consultations on security issues regarding new and existing systems.
■ Monitor IT assets for security requirements to include procedures, software, and integrity.
■ Work to build and maintain a security sensitive mindset within the company culture.
■ Lead major projects and initiatives with a low level of management oversight
■ Assist with the development, implementation, monitoring, maintenance and compliance of all information security standards, policies, and procedures.
■ May lead the activities or work of the team. Provide leadership and direction to members of the department, performing those responsibilities in accordance with the Company's policies and applicable laws. May provide input on interviewing, hiring, planning, assigning or directing work, appraising performance, and resolving problems.
■ Serve in the on-call rotation that ensures 24x7 coverage of the corporate security infrastructure and network environments, assuming responsibility for resolving or escalating any network issues that arise during own on-call period
■ Generate security/network-related Management Information for regular internal reporting, including producing some high-level analysis of any emerging trends.
■ Each team member is expected to be aware of risk within their functional area. This includes observing all policies, procedures, laws, regulations and risk limits specific to their role. Additionally, they should raise and report known or suspected violations to the appropriate Company authority in a timely fashion.
View more information about this job