Senior Cyber Security Specialist

col-narrow-left
Job ID:
2446198
Location:
Libertyville, IL
Category:
Information Technology, Telecommunications, Array
Salary:
$130,000.00 per year
Zip Code:
60048
Employment Type:
Full time
Posted:
12.07.2017
col-narrow-right
col-wide

Job Description:

Senior Cyber Security Specialist
Libertyville, IL

$125-130K +Bonus

Prestigious Organization is seeking a Senior Cyber Security Specialist. The role of the Cybersecurity Analyst is to assist in the building and monitoring of Company's cybersecurity architecture and operations globally, developing appropriate security controls for business partners and service providers.

The Cybersecurity Analyst will ensure Cybersecurity architecture and practices safeguard products and solutions that meet business requirements while maintaining a strong security posture.

The Cybersecurity Analyst handles day to day security administrative and proactive monitoring activities ensuring the stable and secure operations of IT and related systems and components.

The Cybersecurity Analyst will handle all levels of triage for incoming security issues, assessing event priority, determining risks, and monitoring appropriate remediation activities.

The Cybersecurity Analyst will monitor security compliance through technical audits, risk assessments and issue management in order to maintain a compliant, audit ready posture. This role also acts as a core team member to the Enterprise Architecture team and Project Management Office to deliver technical security advisory services.

The Cybersecurity Analyst will work closely with IT Operations and other functional areas to ensure vulnerabilities and threat indicators are rated by severity and responded to in a manner consistent with the risks.

The Cybersecurity Analyst will develop security procedures and metrics for the security of Company global networks, systems and applications.

POSITION RESPONSIBILITES:

Develops and maintains the Cyber Security and privacy technical architecture. Recommends guiding principles and technical standards that foster technology decisions.

    1. Collaborates with IT and business units to understand the requirements for security (stability, availability, integrity, privacy etc.).
    2. Maintains architecture diagrams for both the current and future state.
    3. Builds security controls that transition from current to future state.
    4. Stays abreast of technology innovations relating to cyber security to ensure decisions align with industry best practices.

Steers security operations and implementation of security controls and solutions.

    1. Addresses cyber security service requests and tickets on a timely manner, to customer satisfaction, and within security standards or principles.
    2. Conducts vulnerability scans, effective systems patching and remediation tracking based on defined or applicable risk to the enterprise.
    3. Identifies and implements appropriate security and privacy monitoring within IT to safeguard Company's cybersecurity program.
    4. Configure and support security end point protection, intrusion detection and prevention, Internet and messaging security gateways, encryption architecture, and threat intelligence.

Steers security incident response and mitigation processes.

    1. Executes the security incident response life cycle to drive threat remediation and strategic countermeasures.
    2. Addresses cyber-attacks through proactive identification, containment of security incident, mitigation of malicious threats and malicious software, and system recovery.
    3. Coordinates activity related to Data Loss Prevention (DLP) strategy by configuring appropriate policies, communicating violations and risks, and providing solutions for secure digital transfer or storage.

Identifies Cyber Security and compliance requirements and develops specific solution architectures.

    1. Identifies security and compliance requirements that align with standards, policies, technical controls and architecture principles. Reviews risk assessments completed as part of the project life cycle.
    2. Builds solution architectures that meet project requirements and align with architecture principles and futures architecture vision.
    3. Partners with the Enterprise Architecture function to provide technology evaluations and recommendations relating to cyber security.

Performs security impact assessments to determine the enterprise's specific security and privacy related requirements and appropriate assurance monitoring.

    1. Advocates security risk management framework to ensure that security decisions are consistent and appropriate to Company's needs for system and information protection, integrity, availability, privacy and regulatory compliance.
    2. Performs risk assessment to ensure appropriate security during introduction of new technologies. Review and approve the findings and recommendation of risk assessments.
    3. Conducts audits and monitors issues to provide assurance reporting of how Company is complying with policies, standards, and industry regulatory requirements and the internal control framework in order to maintain a compliant, audit ready, posture.
    4. Conducts security due diligence of third-parties (vendor, suppliers and partners) based on risk model including security contract language, and logical, physical and administrative controls.

Researches and evaluates new technologies for fit into the enterprise and provides security advisory services to the IT Project Management Office (PMO).

    1. Provides feedback and act as a security technical advisor for IT projects and solutions.
    2. Identifies and recommends cyber security controls that will transition the architecture to support future vision.
    3. Works with Project Managers to define security project cost, resource, and schedule estimates.
    4. Analyzes technology industry and market trends, and determines their potential impact on the enterprise.

Contributes to the Enterprise Architecture (EA) and Technical Review Board (TRB) requests for security architecture and technology solutions.

    1. Brings forward new solutions, architectures or technologies to ensure data security safeguards align with IT solutions that will transition the architecture to the denied future vision.
    2. Applies risk based approach or value metrics to define security technical requirements and participate in evaluation scoring.
    3. Oversees technology evaluations and determines the best solution based on business and technical requirements.

QUALIFICATIONS:

Academic Credentials/Length of Experience Requirements:

  • BS/BA Computer Science or equivalent related field of study required.
  • An industry leading security certification required such as Certified Information Systems Security Professional (CISSP) or equivalent.
  • Minimum 5-7 years of progressive technical IT experience focusing on cyber security
  • Talk on the phone with suppliers and Company Associates
  • Read technical manuals/trade journals
  • Use a personal computer and strong proficiency in PowerPoint, Excel and Word
  • Travel via plane or automobile

Specialized skills/technical knowledge

  • Working knowledge of Windows Server and Desktop Operating Systems, Active Directory Domain design and implementation, and endpoint security.
  • Understanding on how to conduct investigations of security incidents.
  • Understanding on how to conduct third-party security due diligence or audits.
  • Understanding of SANS Critical Security Controls or NIST Computer Security Standards
  • Knowledge of TCP/IP, switching, routing, VLANs and VPNs.
  • Knowledge of Next Generation Firewalls or Unified Threat Management (UTM) technologies.
  • Knowledge of Identity and Access Management (IAM) technologies.
  • Knowledge of Security Incident and Event Management (SIEM).
  • Knowledge of Intrusion Detection/Prevention Systems (IDS/IPS) technologies.
  • Knowledge of Privileged Access Management (PAM) solutions.
  • Knowledge of cloud based technology or Cloud Based Security Broker (CASB) technologies.
  • Knowledge of Vulnerability and Threat Management (VTM).
  • Knowledge of virtualized environments and infrastructure technologies.
  • Strong understanding of Shell Scripting, and able to apply knowledge.
  • Knowledge of encryption techniques and PKI infrastructure.
Company Info
Request Technology - Anthony Honquest