Job Description
Job DescriptionWhy we’re different:We are actively involved in the community and care for the wellbeing of our team members. We understand the importance of work/lifebalance while offering hybrid schedules for flexibility and productivity.
Summary:
Responsible for responding to cybersecurity incidents, oversees the remediation of& system& vulnerabilities,& manages& cyber& security& toolsets,& and& aligns& systems& to the& organization’s security standards and compliance requirements.& Relationships:
- Directly& report& to& the& Head& of& Cyber& Security.
- Direct& interactions& to& work& with& and& support& the& internal& IT& team.
- Direct interaction with employees from various departments, including& supervisors& and managers.
- Direct interaction with security vendors and regulatory entities.
Responsibilities:
- Performs all tasks safely, complies with all internal and external safety requirements, supports safety culture, attends all safety trainings and completes all compliance trainings as required by the client .
- Uphold the client’s core values: Customer Service, Respect, Excellence, Stewardship and Teamwork (CREST).
- Monitors for Security Anomalies, Violations of policies, and other& Security& Breaches.
- Responds to Security related incidents and events in an organized and efficient manner,& providing& well-documented reports.
- Leads a Vulnerability management program, working with other IT staff& to& guide& patching and& remediation.
- Performs testing and verification of company security controls, provides& organized& reporting& based& on& findings.
- Management of security tools such as firewalls, vulnerability scanners, SIEM,& asset& discovery& tools,& antivirus& toolset,& and& email& protection& toolsets.
- Assisting& in& aligning& systems& to& organization-wide& security& policies/protocols.
- Collaborates with internal and external stakeholders, such as auditors and regulatory bodies, to ensure compliance with relevant security standards, compliance, and regulations.&
- Stays up to date with the latest cybersecurity threats, vulnerabilities, and industry best practices.
- Contribute& to& security& recommendations& to& Network/System& Designs.
- Participates& in& the security On-call rotation.
- Other& duties& as& assigned.
- Regular, reliable attendance.
Qualifications:
- Bachelor’s& degree& in& computer& science& or& equivalent work experience.
- Work experience& in& information& security.
- Knowledge& of& penetration& testing,& network& security,& and& the& techniques& used& to& expose& and& correct& security& flaws
- A& broad& understanding& of& security& technologies& including& firewalls,& proxies,& Security Information and Event Management (SIEM),& antivirus& software,& and& Identity Providers (IdPs)
- Understanding of vulnerability management and the& ability& to& identify& and& spotlight& vulnerabilities& on& on-premises& and& remote& networks,& correct& problems,& and& prevent security breaches
- Ability to prioritize and create remediation guidelines for system vulnerabilities.
- The ability to think critically and innovatively about security solutions that can keep data safe while maintaining and high level of availability for business systems.&
- Ability to communicate effectively, both verbally and written, with customers, co-workers, and business contacts in& a courteous& and& professional manner
- Must& possess& and& maintain& a& valid& driver’s& license
- Ability& to& perform& work& independently& with& minimal& guidance& and& supervision
- Demonstrated& history.
MUST HAVE:
- Bachelor’s& degree& in& computer& science& or& equivalent work experience.
- Work experience& in& information& security.
- Knowledge& of& penetration& testing,& network& security,& and& the& techniques& used& to& expose& and& correct& security& flaws.
- A& broad& understanding& of& security& technologies& including& firewalls,& proxies,& Security Information and Event Management (SIEM),& antivirus& software,& and& Identity Providers (IdPs)
- Understanding of vulnerability management and the& ability& to& identify& and& spotlight& vulnerabilities& on& on-premises& and& remote& networks,& correct& problems,& and& prevent security breaches
- Must& possess& and& maintain& a& valid& driver’s& license.