Provide expertise and guidance around issues while recommending solutions that mitigate and eliminate risk.
Define company security requirements and review systems to determine if they have been designed to comply with established security standards.
Assist in the enforcement of security policies from planning, technology safeguards and remediation for data, software applications, hardware, and telecommunications.
Develop new standards and reference architecture as necessary.
Develop SOP’s which comply COBIT and ITIL framework and playbooks to promote successful operations.
Establish and maintain operational, configuration and other processes/procedures to ensure effective security policies.
Validate and test security architecture and design solutions to produce detailed engineering specifications with recommended vendor technologies.
Install, configure, apply patches, perform upgrades and troubleshoot endpoint antivirus and other agent-based software on Windows desktop and Windows/Linux servers.
Provide support for Management and IT operations teams to provide answers, audit artifacts, solutions and improvements to security policies.
Participate in forensics and post-mortem investigations of Information Security incidents while preparing report documents to illustrate the findings.
Requirements
Bachelors in Computer Science or Engineering with an emphasis in Information Security or a related field, or equivalent experience preferred.
Minimum 8 years of security engineering experience, specifically in networks, systems, databases, and operations preferred.
Extensive expertise in developing and supporting complex security solutions.
Familiar with industry security regulations and frameworks (MITRE Attack Framework, NIST, CIS etc.).
Experience in private cloud applications security, endpoint, and data encryption.
System administration experience in a Windows and Linux environment preferred.
Experience developing technical documents and procedures, and topology maps with various software applications.
Strong project management skills.
Experience with network security and protocols.
Computer forensics and digital investigation skills.