- Able to evaluate, implement and manage security solutions.
- Able to lead security projects and cross functional project teams.
- Able to implement and manage security policies, procedures and incident response strategies.
- Protects against unauthorized access, modification, or destruction of information assets.
- Works with end users to determine needs of individual departments.
- Hands on experience in Azure or AWS Security
-Ability to setup monitoring of security events in cloud
-Conduct Access Control review of applications database and OS on cloud
-Hands on experience in Cloudera security or Hadoop Security
- Implements policies or procedures, and tracks compliance.
- Familiar with a variety of Information Security concepts, practices, and procedures.
- Security tool system administration
- Functions as a system (or backup) administrator for 4 or more security tools.
- Makes recommendations to improve the functionality of the security tools to improve security posture and/or customer experience.
- Identify unsuccessful and successful intrusion attempts by reviewing and analyzing security events logs and event summary information.
-Conduct third party security or audit
- BS in IT, Computer Science, Management Information Systems or equivalent degree preferred. Work experience may be substituted.
- At least 10 years of IT experience with at least 5-7 years of system/network security experience, including threat modeling, threat assessments, risk identification techniques, penetration testing.
- Security certification desired (e.g., CISSP, ISSMP, ISSAP, GIAC, CEH)
- Proven experience and knowledge of IT Security regulations and standards, especially in HIPAA/HITECH and PCI-DSS.
- Proven experience and detailed technical knowledge in:
- endpoint security and protection
- server security and protection
- data loss prevention
- network security engineering
- deploying intrusion detection/prevention tools
- authentication and security protocols
- security event correlation
- web security gateways
- vulnerabilities and remediation techniques
- application and OS patch management and remediation
All your information will be kept confidential according to EEO guidelines.