Job Responsibilities and Accountabilities
|
Network & Security Architect
- Oversee overall PCI standards and ensure systems design support ongoing PCI compliance.
- Oversee the design and management of the overall network. Work with vendor (s) to ensure the “right sized” solution is in place, balancing cost with performance.
- Define and uphold security standards for any device that is attached to the network.
- Review industry network options to ensure Cub is current with the overall network design, and that it is still meeting the needs of the business.
- Oversee security vendor partners for services such as SIEM, IDS, encryption, and vulnerability management solutions for analysis and investigation.
- Develop and maintain incident response plan and processes to address potential threats.
- Select partners/solution and oversee vulnerability scanners, security event logging & monitoring systems, Intrusion Detection/Prevention System, vulnerability management tools, etc.
- Manage vendors performing system and network security audits to identify security weaknesses and vulnerabilities and reports to management.
- Conducts and/or review artifact analyses for environmental applicability and remediation.
- Performs or supervise forensic evidence collection, investigation, and attestation.
- Creates security threat assessments using Kill Chain methodologies and familiarity with principles of active defense. Hands on experience required.
- Performs threat, vulnerability, and risk assessments and manage security audits.
- Coordinates the handling and resolution of incidents of security breach and day-to-day operations and maintenance of security tools.
- Evaluates and recommends tools and/or configurations including but not limited to the following: secure remote access, email security, web content filtering, endpoint security settings, data loss prevention, etc.
- Develop and implement security plan, standards, guidelines and procedures to ensure ongoing maintenance of security.
- Develop and lead routine exercises (such as tabletops) to evaluate the efficacy of the security partners. Sets standards for improvements for vendors related to people, process, or technology following each exercise.
- Monitors internal control systems to ensure that appropriate information access levels and security clearances are maintained.
- Performs information security risk assessments and serve as the internal auditor for information security processes. Demonstrates expert-level knowledge and skills in the technical, process, organizational, and philosophical aspects of information technology, information security, and information risk management disciplines.
- Oversees penetration testing requirements, assessments, and tracks remediation of critical findings.
- 5 + years of experience
- Other duties as assigned
|
|
|
Job Requirements
|
|
|
|
|
Relevant Experience, Education, Certification, Knowledge, Skills and Abilities
|
|
- Bachelor’s degree in management information systems, computer science, or related discipline is required.
- Postgraduate degrees and certificate programs in relevant areas that demonstrate analytical writing will also be considered.
- CISSP certified/qualified or ability to pursue obtaining these certifications within six months of hire
- SANS GCIH or GCFA, CISA, CISM, EnCER certification(s) and preferred but not required
Skills and Requirements:
- Advanced knowledge of information systems security concepts and technologies; network architecture; general database concepts; document management; hardware and software troubleshooting; intrusion tools and open source alternatives
- Advanced knowledge and understanding of PCI standards an requirements to meet the standards
- Familiarity with security regulatory requirements and standards (such as NIST 800 series, ISO 2700x series, GLBA, FFIEC)
- Knowledge and experience with the Windows, iOS, Android, and Linux operating systems
- Knowledge and experience with Encryption at rest and in transit: CIFS/SMB/Active Directory/NTLM/Kerberos/MS-domain services/windows firewall/LDAP
- Network Security: Firewall, IPS, Anti-Bot, Sniffers, Decoders, SIEM Solutions, Email gateways, Anti-SPAM solutions, Web Filtering, Proxy servers, Data Loss Prevention Systems, SSL offloading, balance loaders
- Knowledge and experience with Common Internet Protocols: IP, TCP, UDP, ICMP, FTP, SMTP, SSH, DNS, DHCP, SNMP, HTTP, HTTPS, NTP
- Experience with Incident Response, Security Appliances, Web Application testing, and Vulnerability Management
Other Functions:
- Ability to work extremely well under pressure while maintaining a professional image and approach
- Exceptional information analysis skills; ability to perform independent analysis and distill relevant findings and root cause
- Ability to make decisions under pressure, and effectively communicate the decision, reason, and impact.
- Strong analytical writing skills to articulate complex ideas clearly and effectively; experience creating and presenting documentation and management reports
- Team player with proven ability to work effectively with other business units, IT management and staff, vendors, and consultants
- Strong communication skills such as planning and leading effective meetings, conducting structured interviews to collect information, interpersonal and negotiation skills, and presenting to a variety of audiences
- Advanced skills to present information to stakeholders and/or decision makers in an effective and professional deliverable
|
|
|
|
|
Physical Environment
|
|
- Some travel may be required
- Most work is performed in a temperature-controlled office environment.
- Incumbent may sit for long periods of time at desk or computer terminal.
- Incumbent may use calculators, keyboards, telephone, and other office equipment in the course of normal workday.
- Stooping, bending, twisting, and reaching may be required in completion of job duties.
|
|