information technology - IT보안 관리

글쓴이: Returnvalues  |  등록일: 05.08.2024 13:46:26  |  조회수: 244
지역
Highland Park,mi 
직종
전문직 
연락처
info@a2zreturnvalues.com 
담당자
Andrew Baek 
고용정보
직원수 15명 이상 
※ 사기글 주의사항 ※
비트코인, 재무설계 등 부업을 빙자하여 수수료를 요구하는 글은 스캠이므로 절대 연락하지 마시고 신고하시기 바랍니다.
이력서 보내주시면 검토후 개별적으로 연락드리겠습니다.

Resume to andrew@a2zreturnvalues.com

Job location: Highland Park MI

Onsite work , Fulltime employee

Salary range: 65k – 110k DOE

Can apply 1-2 YRS+ IT infra experience Eexprience with Computer sicense degree

network infra, server,it security 경험자 지원가능

Purpose:

Participate in all aspects of information systems and network security including intrusion detection, incident response, vulnerability assessment, application security and compliance with the corporate information security policy. Primarily be responsible for implementing, operating, and improving security technologies including DLP, Antivirus, IPS/IDS, End Point Protection, Database Activity Monitoring, Web Application Firewall and processes.

Essential Functions:

Security Engineering:

Design, build, test and deploy new security technologies, which include the development of the operational manual and run books.
Provides technical security operations engineering services to support and update existing security systems and works to automate processes related to security implementations, monitoring, and enforcement.
Investigates, recommends, evaluates, deploys, and integrates operational security tools and techniques to improve our ability to protect corporate assets and infrastructure.
Participate in technical risk assessments and security exposure analyses of systems, networks, and business applications.
Analyzes network security elements and overall network security architectural designs to ensure secure and optimal system and network performance and cost effectiveness.
Oversees the installation, configuration, and supportive processes of security technologies.
Participate in or lead the Incident Response activities.
Interacts with internal and external clients on security operations requirements, identifies security process and develops strategies/solutions to security issues.
Keeps fully abreast of trends and changing technologies as they relate to IT and Network Engineering and Information Security fields.
Lead or assist in periodic or ad-hoc security reports that provide relevant situational awareness to our senior stakeholders.
Security Operations/ Administration:

Monitor and manage our networks and infrastructure environment for attacks, malicious software, and possible intrusions, which includes the follow up of complete remediation of infected systems.
Required to be on-call (after hours) per the established rotational schedule.
Implement changes to our security technologies / infrastructure in accordance with standard and change control policies / procedures.
Evaluate, implement, tune and operate Security Solutions such as IPS, Vulnerability scanning tools, encryption capabilities, etc
Monitor and recommend improvements of security technologies and their various reports.
Risk Management/ Security Audit/Assessment support/ Ad-hoc support:

Support security audit / assessment related activities and compliance reviews.
Performs other task, duties and projects as assigned.
Provide Ad-hoc support as required.
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.

Basic Requirements:

Bachelor’s degree in computer science, Information Systems or related field, or equivalent experience.
Minimum of 5 years of IT relevant experience or equivalent combination of experience plus at least 3 years of experience performing Security Engineering / Planning / Operations.
Experience in medium to complex computing environments, with advanced knowledge in security technologies and services.
Hands-on experience with at least two or more of the following Enterprise Security Technologies:
– Network Intrusion Prevention / Detection
– Virtual Private Networks; SSL, IPSec and Site-to-Site
– Enterprise Class Stateful Inspection Firewalls
– Network Access Controls in context to Identity management
– Windows Server OS & Desktop OS
– Network Packet Inspection
– Directory Services including LDAP, AD and Secure Authentication Technologies
Experience in implementing Information Security technologies and/or processes required.
Experience in defining Information Security strategies and frameworks.
Experience integrating security technologies into corporate operations frameworks.
Ability to communicate effectively with client staff at all levels, from technical to executive.
Multi-task oriented in a team environment.
Demonstrated ability to pay close attention to detail.
Knowledge of Information Security risk assessment methodologies and standards
Experience developing technical documentation, including reports, proposals, statements of work, and whitepapers.
Ability to work independently, undertaking and completing project tasks on schedule with minimal supervision.
CERTIFICATIONS- CISSP, CISSP-ISSAP, SANS, or other professional certification applicable to security engineering are preferred.


 
DISCLAIMERS: 이 글은 개인회원이 직접 작성한 글로 내용에 대한 모든 책임은 작성자에게 있으며, 이 내용을 본 후 결정한 판단에 대한 책임은 게시물을 본 이용자 본인에게 있습니다. 라디오코리아는 이 글에 대한 내용을 보증하지 않으며, 이 정보를 사용하여 발생하는 결과에 대하여 어떠한 책임도 지지 않습니다. 라디오코리아의 모든 게시물에 대해 게시자 동의없이 게시물의 전부 또는 일부를 수정 · 복제 · 배포 · 전송 등의 행위는 게시자의 권리를 침해하는 것으로 원칙적으로 금합니다. 이를 무시하고 무단으로 수정 · 복제 · 배포 · 전송하는 경우 저작재산권 침해의 이유로 법적조치를 통해 민, 형사상의 책임을 물을 수 있습니다. This article is written by an individual, and the author is full responsible for its content. The viewer / reader is responsible for the judgments made after viewing the contents. Radio Korea does not endorse the contents of the articles and assumes no responsibility for the consequences of using the information. In principle, all posts in Radio Korea are prohibited from modifying, copying, distributing, and transmitting all or part of the posts without the consent of the publisher. Any modification, duplication, distribution, or transmission without prior permission can subject you to civil and criminal liability.

잡톡 [ Job Talk ]

이민법

사람찾기

상법 · 소송