Essential Functions
Note: The essential duties and primary accountabilities below are intended to describe the general content and requirements of this position and are not intended to be an exhaustive statement of duties. Incumbents may perform all or most of the primary accountabilities listed below. Specific tasks, responsibilities or competencies may be documented in the incumbent’s performance objectives as outlined by the incumbent’s immediate supervisor or manager.
1. Creates solutions for pre-existing security issues to properly address and eliminate existing threats of security breaches and intrusions.
2. Defines, implements, and enforces corporate security policies and best practices.
3. Configures, installs, and maintains security tools to protect information and network infrastructure and computer systems.
4. Promptly responds to and resolves data security crises and network security incidents. Investigates and resolves non-standard security vulnerabilities.
5. Regularly oversees the security of facilities, software, hardware, and user needs.
6. Regularly performs penetration testing to assist in identifying vulnerabilities within the IT infrastructure and to validate the effectiveness of existing security measures.
7. Provides information assurance to help ensure the integrity, availability, authenticity, confidentiality and non-repudiation of information and information systems.
8. Coordinate with compliance resources on HIPAA audit requirements to improve compliance and related risk processes and procedures.
9. Responsible for securing the Microsoft environment and endpoints for all employees including, but not limited to PC’s, cellphones, servers, and SaaS products.
10. Creates and maintains IT Security Policies and Procedures as needed.
Marginal or Additional Functions
1. Assist in oversight of Azure/M365 Cloud Administration to include tasks such as creating and managing virtual networks, configuring and monitoring storage accounts, and ensuring security and compliance.
2. Assist with device management (physical and mobile) to ensure devices are secure, up-to-date, and compliant with organizational policies with the goal of protecting the corporate network and data from unauthorized access.
3. Participate in CISA/NIST CVE Reviews and Analysis.
4. Communicates threats and risks to senior leaders and recommends security solutions, as appropriate
Supervisory and Managerial Responsibility
• None
Knowledge, Skills & Abilities
Education, Licensure or Certification:
• A bachelor’s degree or equivalent work experience in Computer Science, Information Systems, Cybersecurity, or related discipline required.
Work Experience or Related Experience:
• Three to five years of proven work experience in a cybersecurity, computer science, information systems or a related discipline role required
• Secure coding practices, ethical hacking and threat modeling
Specialized Knowledge, Skills & Abilities:
• Proficiency in Python, C++, Java, Ruby, Node, Go and/or Power Shell
• Windows, UNIX and Linux operating systems
• Visualization technologies
• Identity and Access Management principles
• Application security and encryption technologies
• Strong communication and interpersonal abilities
• Ability to maintain confidentiality, and to exercise discretion and good judgment
• Proficient with Microsoft Office Suite or related software
• Knowledge of HIPAA a plus
• Experience with audit deliverable a plus
• Linux and/or GCP administration knowledge a plus
• Experience with Meraki and Ubiquiti are valuable
• Familiarity with Defender XDR is preferred
Equipment:
• Working knowledge of a PC, business and communications software (MS Office) and web-based tools are required
• Advanced understanding of computer, network, and virtual machine operations
• PowerShell and/or Python scripting and code review is required
Travel Requirements and Conditions
• Limited travel may be required
Work Environment, Conditions and Demands
• Work is performed in both a home and office environment
Physical Requirements and Demands
Note: Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions as described.
• This position entails a high level of work performed at a computer terminal and telephone or headset equipment throughout the day
• Regular eye-hand coordination and manual dexterity is required to operate office equipment