Information Security Engineer

World Wide Technology Healthcare SolutionsJenks, OK
6h$92,000 - $115,000

About The Position

The WWT Information Security (InfoSec) team is currently searching for an InfoSec Engineer to join the Information Security GRC Team. As a member of the team, you will be responsible for developing automations, as well as implementing and maintaining the tools and capabilities used to ensure the security and protection of sensitive data within our organization. You may also assist in identifying and investigating data loss events, insider threat events, collaborating with the Security Operations Center, Legal, Compliance, and Corporate Security teams to mitigate threats, and engaging with senior team members and leaders to perform actions and carry out initiatives in these areas.

Requirements

  • Bachelor’s Degree (or equivalent) in Computer Science, Information Technology, Cyber Security, or related discipline preferred, not required, and/or a minimum of 2-5 years of experience in roles related to cyber security operations and/or DLP operations.
  • Experience in administration and engineering with the security technologies for Data Security Governance and Compliance, such as Database Activity Monitoring, Data Loss and Security, Data Security Posture Management, Endpoint Protection, and file and removable media protection, and Security Information and Event Management (SIEM).
  • Hands-on experience with automating and securing Linux, Windows, Mac, networking, database, cloud, and middleware technologies.
  • Excellent interpersonal, verbal, and written communication skills with the ability to communicate security risk and compliance-related concepts to a technical and non-technical audience.
  • Self-starter, team player, and enthusiasm for learning
  • Applicants must be authorized to work in the United States. We are unable to provide sponsorship for this position.

Nice To Haves

  • Information Security Certification preferred, such as CISSP.

Responsibilities

  • Automation of GRC Processes
  • Strong architectural skills to identify automation opportunities and implement automation connections, tools, and systems to streamline manual GRC operations in partnership with Information Security and IT teams.
  • Develop and maintain automation plans, scripts, workflows, integrations, and systems for GRC platforms and processes (e.g., policy management, risk assessments, control testing, audit management).
  • Configure, support, and optimize existing and recommended automation tools for GRC (such as Archer, ServiceNow, or similar), including custom modules, dashboards, and reporting.
  • Monitor, troubleshoot, and optimize automated GRC workflows to ensure accuracy, reliability, and compliance with regulatory standards (e.g., GDPR, CCPA).
  • Leverage scripting, APIs, and low-code/no-code automation platforms to continuously improve GRC processes.
  • Governance, Documentation, and Stakeholder Enablement
  • Document automation designs, processes, and procedures to support audit and compliance requirements.
  • Train and support stakeholders on new automated GRC solutions and best practices.
  • Stay current with emerging GRC technologies, frameworks, and regulatory requirements to ensure ongoing compliance and innovation.
  • Security Controls Automation & Monitoring
  • Establish and implement critical security controls and secure build standards in collaboration with technology and application owners.
  • Facilitate the creation of compliance automation and policy-as-code to streamline governance.
  • Deploy, configure, and maintain security tools and technologies for monitoring, detecting, and reporting security control configurations
  • Data Loss Prevention (DLP) & Information Protection
  • Technical knowledge of Data Loss Prevention (DLP) controls, including policy development, procedures, and implementation.
  • Deploy, configure, and maintain DLP tools and technologies to monitor, detect, and prevent data leakage or unauthorized transfers.
  • Hands-on experience with Data Classification policies and technologies to address data leakage and information protection.
  • Threat and Vulnerability Management (TVM)
  • Technical knowledge of Threat and Vulnerability controls, including policy development, procedures, and implementation.
  • Deploy, configure, and maintain TVM tools and technologies to monitor, detect, and prevent vulnerability exposure.
  • Hands-on experience with threat and vulnerability policies and technologies to address compliance and SLA requirements for patching vulnerabilities.

Benefits

  • Health and Wellbeing: Health, Dental, and Vision Care, Onsite Health Centers, Employee Assistance Program, Wellness program
  • Financial Benefits: Competitive pay, Profit Sharing, 401k Plan with Company Matching, Life and Disability Insurance, Tuition Reimbursement
  • Paid Time Off: PTO and Sick Leave (starting at 20 days per year) & Holidays (10 per year), Parental Leave, Military Leave, Bereavement
  • Additional Perks: Nursing Mothers Benefits, Voluntary Legal, Pet Insurance, Employee Discount Program
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service