Who we are:
ITRCC is dedicated to delivering outstanding customer service focused on safety
and built around our core values: Customer Service, Respect, Excellence,
Stewardship, and Teamwork. Spanning 157 miles, across northern Indiana, ITRCC
implements our core values to offer a safer and more efficient way of commuting.
Why we’re different:
ITRCC’s efficiency relies on our team members; at the ITRCC you won’t just be part
of a company, you will be part of a family who respects their members and strives
to cultivate sustainability. We are actively involved in the community and care for
the wellbeing of our team members. We understand the importance of work/life
balance while offering hybrid schedules for flexibility and productivity.
Summary:
Responsible for responding to cybersecurity incidents, oversees the remediation of system vulnerabilities, manages cyber security toolsets, and aligns systems to the organization’s security standards and compliance requirements.
"We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law.”
Relationships:
- Directly report to the Head of Cyber Security.
- Direct interactions to work with and support the internal IT team.
- Direct interaction with employees from various departments, including supervisors and managers.
- Direct interaction with security vendors and regulatory entities.
Responsibilities:
- Performs all tasks safely, complies with all internal and external safety requirements, supports ITRCC safety culture, attends all safety trainings and completes all compliance trainings as required by ITRCC.
- Uphold ITRCC’s core values: Customer Service, Respect, Excellence, Stewardship and Teamwork (CREST).
- Monitors for Security Anomalies, Violations of policies, and other Security Breaches.
- Responds to Security related incidents and events in an organized and efficient manner, providing well-documented reports.
- Leads a Vulnerability management program, working with other IT staff to guide patching and remediation.
- Performs testing and verification of company security controls, provides organized reporting based on findings.
- Management of security tools such as firewalls, vulnerability scanners, SIEM, asset discovery tools, antivirus toolset, and email protection toolsets.
- Assisting in aligning systems to organization-wide security policies/protocols.
- Collaborates with internal and external stakeholders, such as auditors and regulatory bodies, to ensure compliance with relevant security standards, compliance, and regulations.
- Stays up to date with the latest cybersecurity threats, vulnerabilities, and industry best practices.
- Contribute to security recommendations to Network/System Designs.
- Participates in the security On-call rotation.
- Other duties as assigned.
- Regular, reliable attendance.
Qualifications:
- A bachelor’s degree in computer science or equivalent work experience.
- Work experience in information security.
- Knowledge of penetration testing, network security, and the techniques used to expose and correct security flaws
- A broad understanding of security technologies including firewalls, proxies, Security Information and Event Management (SIEM), antivirus software, and Identity Providers (IdPs)
- Understanding of vulnerability management and the ability to identify and spotlight vulnerabilities on on-premises and remote networks, correct problems, and prevent security breaches
- Ability to prioritize and create remediation guidelines for system vulnerabilities.
- The ability to think critically and innovatively about security solutions that can keep data safe while maintaining and high level of availability for business systems.
- Ability to communicate effectively, both verbally and written, with customers, co-workers, and business contacts in a courteous and professional manner
- Must possess and maintain a valid driver’s license
- Ability to perform work independently with minimal guidance and supervision
- Demonstrated history performing in a data security role with responsibilities that include safeguarding digital information from corruption, theft, or unauthorized access.
- Public cloud (AWS, Azure, GCP) infrastructure security experience
Desirable Experience:
- Checkpoint Security Certifications - CCSA (Check Point Certified Security Administrator)
- Tenable products experience
- Microsoft Azure Certification – AZ-900
Working Conditions:
- This position requires: (Frequent est. 5 hrs. per shift)
- Frequent Standing, Walking and Sitting.
- Frequent Talking and Hearing.
- Light Physical Effort.
- Heavy Computer usage.
- Travel time required may be up to 20%
40 hours / full time, on call rotation.