Security Services Engineer III

GCI Communication CorpAnchorage, AK
2d

About The Position

GCI's Security Services Engineer III will manage and maintain multiple security systems across different technologies for all ESO teams. Work with rest of SSA team and application stakeholders to harden systems against unauthorized use. Recommend and improve existing systems through automation or changes in service delivery. Capable of developing relationships with other teams across GCI to work together towards providing valuable security tools to help ensure a secure working environment. ESSENTIAL DUTIES AND RESPONSIBILITIES AT ALL LEVELS: Strong capacity to make detailed documentation, processes, and diagrams on assigned systems or projects. Willingness to work alongside teammates in an environment centered around contributions to high priority tasks and learning new technologies. Maintain a high degree of confidentiality and familiarity with chain of custody requirements when assisting other ESO teams during an investigation. Capable of working directly with vendors and providing analysis to both existing process and system improvements Ability to track and manage project deadlines or deliverables while keeping notes on key performance indicators. Attend collaboration and improvement sessions with business owners with an emphasis on securely enabling business. Work directly with vendors while maintaining a professional presentation reflective of the company image. COMPETENCIES: ACCOUNTABILITY- Takes ownership for actions, decisions, and results; openly accepts feedback and demonstrates a willingness to improve. Take ownership and accountability of problems and facilitate finding a solution, involving other groups as necessary. Own and manage priorities and individual tasks without direct supervision. Take initiative and seek out opportunities. Assess and accept risks and learn from mistakes. BASIC PRINCIPLES - Interacts with people in a way that builds mutual trust, confidence, and respect; adheres to GCI’s Code of Conduct for Employees – the Basic Principles. Lead by example on all fronts. Guide development teams in a manner that creates success and allows for future self-sufficiency. Foster innovation and promote teamwork. COLLABORATION - Works effectively with others to accomplish common goals and objectives; maintains positive relationships even under difficult circumstances. Build and maintain effective working relationships with leadership, peers, customers, and vendors. Work to resolve problem relationships directly. COMMUNICATION- Conveys thoughts and expresses ideas appropriately and professionally. Build and maintain effective working relationships with leadership, peers, customers, and vendors. COMPLIANCE - Follows internal controls; protects company and customer confidential information; abides by GCI’s Code of Business Conduct & Ethics. CUSTOMER FOCUS - Demonstrates commitment to service excellence; gives high priority to customer satisfaction. Provide a professional level of service to both external and internal customers. RELIABILITY - Consistently follows through on assigned tasks as expected; demonstrates timely attendance at meetings, training, and other work obligations. RESULTS - Uses a combination of knowledge, initiative, sound decision making, innovation, adaptability, and problem solving. SAFETY & SECURITY - Supports a safe work environment by following all workplace safety rules and guidelines; complies with applicable Security policies and procedures. TECHNICAL COMPETENCIES: Ability to think outside of the box and document areas improvement to infrastructure capacity and redundancy. Familiarity with virtual and template driven deployments. Familiarity with scripting and programming languages such as Powershell, Python, Perl, bash, JavaScript, C / C++, C#, Java, VB. Knowledge of network infrastructure, including routers, switches, firewalls, and the associated network protocols and concepts. Excellent technical knowledge and a wide range of security technologies, such as network security appliances, Identity and Access Management (IAM) systems, anti-malware solutions, automated policy compliance tools, and desktop security tools. Familiarity in a multi-platform, multi-service environment – Windows, Linux, Mac, wireless, databases, web application stacks, Active Directory, virtualization, and cloud computing. Familiarity IT processes include incident management, problem management, change management, and release management. Audit, compliance, and governance familiarity. MS Office knowledge (e.g., Outlook, Teams, Word, Excel). Additional Job Requirements: This is an intermediate level position requiring the ability to perform complex and diverse duties under deadlines and operating constraints. Capable of performing the role for large projects. Requires ability to perform development and implementation of security, programs, and procedures of general organizational impact. Must have the experience to provide functional/technical guidance to lower-level staff while fostering teamwork within area of responsibility. Position functions under moderate to minimal supervision. Additional Competencies: Mentorship and training of tier I & II engineers Implement strong controls and develop new processes with Strong written, verbal and presentation communication skills with high level analytical and problem-solving skills Ability to lead migration and conversion plans related to business owner infrastructure with strong emphasis on automation of more complex tasks. Show leadership abilities with the capability to develop and guide team members while working with minimal supervision.

Requirements

  • A combination of relevant work experience and/or education sufficient to perform the duties of the job may substitute to meet the total years required on a year-for-year basis
  • High School diploma or equivalent.
  • Bachelor’s degree in computer science, technology, security, or relevant field.
  • Minimum of six (6) years’ experience in information technology infrastructure, programming development, support, operations, systems, security, administration, access control, cryptography, architecture, analysis, disaster recovery, investigations, compliance, or technical legal areas (such as those involved in law enforcement, prosecution, defense, or forensics) or related background.
  • Ability to think outside of the box and document areas improvement to infrastructure capacity and redundancy.
  • Familiarity with virtual and template driven deployments.
  • Familiarity with scripting and programming languages such as Powershell, Python, Perl, bash, JavaScript, C / C++, C#, Java, VB.
  • Knowledge of network infrastructure, including routers, switches, firewalls, and the associated network protocols and concepts.
  • Excellent technical knowledge and a wide range of security technologies, such as network security appliances, Identity and Access Management (IAM) systems, anti-malware solutions, automated policy compliance tools, and desktop security tools.
  • Familiarity in a multi-platform, multi-service environment – Windows, Linux, Mac, wireless, databases, web application stacks, Active Directory, virtualization, and cloud computing.
  • Familiarity IT processes include incident management, problem management, change management, and release management.
  • Audit, compliance, and governance familiarity.
  • MS Office knowledge (e.g., Outlook, Teams, Word, Excel).
  • Implement strong controls and develop new processes with Strong written, verbal and presentation communication skills with high level analytical and problem-solving skills
  • Ability to lead migration and conversion plans related to business owner infrastructure with strong emphasis on automation of more complex tasks.
  • Show leadership abilities with the capability to develop and guide team members while working with minimal supervision.

Nice To Haves

  • Experience within a telecommunication industry.
  • Two (2) years’ experience involving Information Security Tools Operations.
  • Three information security certifications.
  • Other information security, telecom industry or job specific certifications.

Responsibilities

  • Manage and maintain multiple security systems across different technologies for all ESO teams.
  • Work with rest of SSA team and application stakeholders to harden systems against unauthorized use.
  • Recommend and improve existing systems through automation or changes in service delivery.
  • Capable of developing relationships with other teams across GCI to work together towards providing valuable security tools to help ensure a secure working environment.
  • Strong capacity to make detailed documentation, processes, and diagrams on assigned systems or projects.
  • Willingness to work alongside teammates in an environment centered around contributions to high priority tasks and learning new technologies.
  • Maintain a high degree of confidentiality and familiarity with chain of custody requirements when assisting other ESO teams during an investigation.
  • Capable of working directly with vendors and providing analysis to both existing process and system improvements
  • Ability to track and manage project deadlines or deliverables while keeping notes on key performance indicators.
  • Attend collaboration and improvement sessions with business owners with an emphasis on securely enabling business.
  • Work directly with vendors while maintaining a professional presentation reflective of the company image.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service