Implements, operates, and participates in designing cybersecurity protective technologies, including endpoint detection and response, cloud infrastructure controls and network protections.
Operates technologies such as wide area network, partner gateways, internet of things security, email, collaboration tools, local area network, wireless and network segmentation, virtual private networks, proxies, demilitarized zones, middle tier systems, databases and web servers.
Participates as a co-creator and operating partner with internal cross functional teams on shared infrastructure initiatives.
Operates all information technology service management interfaces, including asset, change, configuration, problem, and request management.
Researches moderately complex system security needs for operations development, including security requirements definition, risk assessment and systems analysis.
Drafts and provides analytical support for security policy development and analysis in compliance with industry standards.
Prepares and performs moderately complex incident response, disaster recovery, and business continuity planning, ensuring readiness for potential security breaches.
Requirements
Minimum requirement of 2 years of relevant work experience.
Typically reflects 3 years or more of relevant experience.
Experience with policy orchestration and firewall management tools such as Tufin.
Experience working with proxy, secure web gateway (SWG), ZTNA, CASB, and FWaaS solutions.