Information Systems Security work focuses on preventing cyber crime, hacking, intentional or inadvertent modification, disclosure, or destruction to an organization's information systems and IT assets and intellectual property, including:
Designing, testing, and implementing secure operating systems, networks, and databases
Authentication auditing, network-based and Web application-based vulnerability scanning, virus management, and intrusion detection
Conducting risk audits and assessments, providing recommendations for application design
Monitoring and analyzing system access logs using through a security information and event management (SIEM)
Planning for security backup and system disaster recovery.
Work is reviewed prior through periodic meetings.
Setting goals and objectives for team members for the achievement of operational results
Ensure that direct reports, customers, and stakeholders understand and follow policies, practices, and procedures
Provide information security awareness training to organization personnel
Creating and managing security strategies
Develop and implement security policies and procedures
Manage the incident response plan
Stay up-to-date on the latest cybersecurity threats and trends
Oversee information security audits, whether performed by the organization or third-party personnel
Manage the managed detection and response (MDR) system and all other information security personnel/programs
Handle security compliance and audits
Work with internal IS stakeholders, departments, legal, projects with external vendors and compliance, to ensure the organization is protected
Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement
Implement and oversee technological upgrades, improvements, and major changes to the information security environment
Implementing robust security measures to safeguard critical infrastructure systems
Serve as a focal point of contact for the information security team and the customer or organization
Manage and configure physical security, disaster recovery, and data backup systems
Communicate information security goals and new programs effectively with other department managers within the organization
Review projects and initiatives for information security considerations: Collaborate with project teams and stakeholders to assess the security requirements and implications of new initiatives, systems, applications, and technologies. Conduct security reviews and provide recommendations to ensure that security controls are incorporated throughout the project lifecycle, from design and development to deployment and maintenance.
Review contracts and statements of work for security risks
Assist with requirements for technology solution request for proposals (RFPs)
Align the organization concerning risk management and evaluate vendor risk,
Strong understanding of computer hardware and software
Experience creating custom dashboards and reports in Splunk using threat
data
Computing Environment Cert: Linux , Splunk Administrator
Experience working with Linux Operating Systems such as RedHat Enterprise Linux (RHEL), Debian, or FreeBSD.
Experience with scripting using tools such as Perl, Bash, PowerShell, etc
Excellent customer service skills
Ability to work independently and as part of a team
Ability to work under pressure and meet deadlines
Cyber certification and / or experience in the field (CISSP, CASP , CISM, GSLC)
Click the checkbox next to the jobs that you are interested in.
Click the checkbox next to the jobs that you are interested in.
Architecture Skill
Building Codes and Regulations Skill
Information Security Engineering Manager
Wells Fargo, Columbus, OH
Bold Penguin, Columbus, OH