Sr. Associate, Information Security
REMOTE - New Jersey
Designs, analyzes and supports the company's information technology structure, systems and processes. Acquires, designs, implements and operates the company's information technology resources (e.g., computer hardware, operating systems, communications, software applications, data, databases, etc.). Deploys, acquires, maintains and ensures security of information technology assets. Plans and tests processes to ensure compliance with system requirements, business objectives, security standards and other technical requirements.
Essential Functions/Responsibility Statements:
Provides direction and acts as an escalation point on projects and issues to other team members.
Interacts with partners as needed to explain work product, security techniques, methodology and results to ensure appropriate business value.
Acts as senior resource for incident response related activities. Collaborates with technical teams for security incident remediation and communication.
Acts as influencer of peers and management.
Oversees management and deployment of security infrastructure including Vulnerability Management, WAF, Network Monitoring, Logging correlation, DDOS prevention and IPS/IDS.
Provides technical security consulting support to address complex business and technology projects and requests.
Contributes to strategic planning to evaluate, deploy or update security technologies.
Analyzes and implements security solutions to meet customer requirements.
Conducts risk assessments to evaluate the effectiveness of existing controls and determine the impact of proposed changes to business processes, applications and systems.
Promotes cross-department collaboration and communication to ensure appropriate processes, procedures and tools are installed, monitored, and effectively operating and alerting.
Allocates and prioritizes security resources efficiently within the organization managing both resources and budgets.
Conducts security research on threats and remediation methods.
Develops and maintains a set of operational and forward looking security metrics.
Oversees daily monitoring of security reports to identify issues and follow these issues to resolution.
Oversees security projects and the security testing of new and existing applications.
Prepares system security reports by collecting, analyzing, and summarizing data and trends; presents reporting for management review.
Creates process improvement by identifying inefficiencies and solutions for process improvements.
Writes clear implementation guidelines for the implementation engineers.
Guides and confirms that the design has been implemented as per the requirements.
Updates job knowledge by tracking and understanding emerging security practices and standards; participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations.
Qualifications: To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be …
This job isn't fresh anymore!
Search Fresh JobsJob Profile
- Conduct risk assessments
- Ensure compliance
- Provide technical consulting
- Risk assessments
Business Processes Communication Compliance Incident Response Information security Interpersonal ISO IT Security Judgment Leadership Monitoring Network Monitoring NIST Palo Alto PCI Presentation Process Improvement Relationship building Remediation Reporting Risk Assessment Security consulting Security metrics Security standards SOX Splunk Strategic planning Testing Training Vulnerability Management
Experience9 years
EducationBachelor's degree Business Equivalent work experience Information Technology Management
TimezonesAmerica/Anchorage America/Chicago America/Denver America/Los_Angeles America/New_York Pacific/Honolulu UTC-10 UTC-5 UTC-6 UTC-7 UTC-8 UTC-9