Overview
DexKo Global, the global leader in highly engineered, technology driven, running gear and structural solutions for the growing towable work and recreational trailer industry, has an opportunity for an IT Security and Service Desk Co-Op position at our global headquarters location in Novi, Michigan.
DexKo Global has achieved its success by delivering market leadership in product development and innovation, increased manufacturing flexibility, great efficiency through global sourcing and unparalleled customer service.
For more information about our company, access DexKo Global’s web site at www.dexko.com.
DexKo Global offers a competitive salary and comprehensive benefits. Dexter’s benefits package includes Health, Dental, Vision, Life, STD, LTD, FSA, HSA, and 401(k) Plan with company contributions.
Position Summary
The IT Security Analyst performs two core functions for the enterprise. The first is the day-to-day operations of the in-place security solutions while the second is the identification, investigation, and resolution of security breaches detected by those systems. Secondary tasks may include involvement in the implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines, and procedures as well as conducting vulnerability audits and assessments. The IT Security Analyst is expected to be fully aware of the enterprise’s security goals as established by its stated policies, procedures, and guidelines and to actively work towards upholding those goals. More specifically, this position will be responsible for activities including but not limited to the following:
Acquisition & Deployment
- Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors
- Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the IT Security Manager, where appropriate.
- Perform the deployment, integration, and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically.
Operational Management
- Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e. security tools) or not (e.g. workstations, servers, network devices).
- Maintain operational configurations of all in-place security solutions as per the established baselines.
- Monitor all in-place security solutions for efficient and appropriate operations.
- Review logs and reports of all in-place devices, whether they be under direct control (i.e. security tools) or not (e.g. workstations, servers, network devices). Interpret the implications of that activity and devise plans for appropriate resolution.
- Participate in investigations into problematic activity.
- Participate in the design and execution of vulnerability assessments, penetration tests, and security audits.
- Provide on-call support for end users for all in-place security solutions.
- Perform hands-on fixes at the desktop level when remote tools are not appropriate, including hardware repairs, delivery of peripherals, or other fixes as determined.
- Ensuring that DexKo is up-to-date with latest security standards, patches, network protocols and products.
- Manage vendor relationships and establish vendor protocols for security.
- Ability to project manage deployment of complex security technologies.
- Research security architecture, security technologies and security solutions.
- Understand current infrastructure and network architecture.
- Assess current security controls.
- Recommend improvements to the current security posture.
- Identify areas where controls are lacking or inadequate.
- Prepare the organization to respond to possible security incidents and breach.
Requirements
Bachelors degree in Computer Science or similar discipline along with 5 years of experience; or a combination of education and experience. Qualified candidates will have:
- Excellent written and verbal capabilities
- Extensive experience with:
- Anti-virus and EDR solutions
- Patching and IT Asset Management systems (Manage Engine Preferred)
- SIEM and correlation Management Tools
- Vulnerability Management Solutions and Penetration Testing
- Working Technical Knowledge of:
- Security Awareness Education Platforms
- NIST and GDPR Frameworks
- Security Auditing Techniques
- Strong Understanding of:
- IP, TCP/IP, and other network administration protocols
- Incident Response Procedures and Policies
- Computer Forensics and Reverse Engineering
- Proven analytical and problem-solving capabilities
- Detail oriented
- Proactive, self-starter motivated by new challenges