Information Systems Security Expert

Recrutement Offres d'emplois

Attention, ce contenu n'est plus d'actualité !
Merci de l'ignorer

Essential Duties and Responsibilities:  

Collects/programs/compiles/assembles and maintains tools to perform successful penetration testing and provides results.

Develops/implements/manages/monitors security devices such as firewalls, IDS/IPS, log management systems, authentication and VPN systems.

Works as a liaison between IT, the lines of business and Information Security to ensure full and complete implementation of security controls, standards and policies.

Provides security architecture and design expertise for networking environments.

Manages IT and company compliance issues.  Produces detailed documentation including data flow diagrams, logical diagrams, and physical diagrams as required.

Develops, enhances and executes security operations processes.

Assists IT operations with remediation planning and implementations

Designs, builds and implements security network controls, monitoring and configuration management tools

Develops intrusion protection and monitoring capabilities

Provides threat analysis and risk management services

Contributes to incident response and event handling

Additional participation and collaboration in network and systems security installation, configuration, and review as required.

Additional duties as assigned by manager

Job Requirements

Education and/or Experience:

2+ years’ experience

BS degree or equivalent preferred

Strong experience performing penetration testing and detecting glitches in security, configuring and managing firewalls

Strong experience with network routing, switching, TCP/IP addressing design and troubleshooting, packet capture and analysis

Experience design, implementation and management of VPN solutions.

Experience with network intrusion protection solutions

Solid understanding of security concepts, principles and practices

Strong experience with network and application level firewalls

Experience with design and implementation of large scale security projects

Experience with log management, reporting tools and development

Experience with strong authentication techniques

Ability to develop quantitative, prioritized action plans to mitigate risk

Incident response experience

Process, procedure, and standards development experience

Good customer service skills

Solid team player with a “can do" attitude

Excellent written and oral communication and documentation skills

Past security training and certification, such as CEH (certified ethical hacker) or CISSP preferred.


Email résumé in word or pdf format to