Monitor, manage, and administer IT Security specific technical control solutions (e.g. Content filtering, IDS/IPS, Firewall, End point protection, etc..), as well as, IT Security specific tools to assess vulnerabilities and incidents; i.e. Enterprise SIEM, forensics tools, vulnerability scanning tools, etc.. Monitor and respond to information security issues related to the systems and workflow to ensure Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls. Coordinate response to information security incidents. Collaborate with IT management, legal, compliance and other applicable teams to manage vulnerability exposures. Assists in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines). Create, manage and maintain user security awareness. Conduct security research in keeping abreast of latest security issues. Involved in the evaluation of products and/or procedures to enhance productivity and effectiveness.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Education Level
No Education Listed