This job listing has expired and the position may no longer be open for hire.

Network/Security Architect at SUPERVALU Inc in Stillwater, Minnesota

Posted in Software 30+ days ago.

Type: Full-Time





Job Description:












Purpose



 

The Network/Security Architect is responsible for the design, implementation, and support of overall network and security solutions for Cub Food stores and the related office sites.  This position will architect and oversee the implementation and third-party management of the Cub network and security solutions that protect the availability, confidentiality, and integrity of Cub’s systems and data.  These solutions include, but are not limited to cyber security operations center technologies and processes, threat intelligence solutions, vulnerability management technologies, and overall security solutions such as web content filtering, forensic solutions, end point security, etc.  Ensures we have the network design, bandwidth, and redundancy, to optimize cost and performance/demand.  This position is also responsible for the PCI compliance and reporting for Cub Food stores.

 



The Network/ Security Architect is a leadership role which will oversee third-party managed services partners in the network and security fields.  This position will review, recommend, and drive implementation of improvements to the network and security ecosystem to ensure Cub’s associate, business, and customer data is secure.  This position will work across IT and with external vendors in a consultative/leadership approach to ensure security is integrated into all aspects of the business.  The role will additionally review, monitor, and update processes and procedures to run the day-to-day network and security monitoring. 

 


 











































Job Responsibilities and Accountabilities



 

Network & Security Architect

 


  • Oversee overall PCI standards and ensure systems design support ongoing PCI compliance.

  • Oversee the design and management of the overall network.  Work with vendor (s) to ensure the “right sized” solution is in place, balancing cost with performance.

  • Define and uphold security standards for any device that is attached to the network.

  • Review industry network options to ensure Cub is current with the overall network design, and that it is still meeting the needs of the business.

  • Oversee security vendor partners for services such as SIEM, IDS, encryption, and vulnerability management solutions for analysis and investigation.

  • Develop and maintain incident response plan and processes to address potential threats. 

  • Select partners/solution and oversee vulnerability scanners, security event logging & monitoring systems, Intrusion Detection/Prevention System, vulnerability management tools, etc.

  • Manage vendors performing system and network security audits to identify security weaknesses and vulnerabilities and reports to management.

  • Conducts and/or review artifact analyses for environmental applicability and remediation.

  • Performs or supervise forensic evidence collection, investigation, and attestation.

  • Creates security threat assessments using Kill Chain methodologies and familiarity with principles of active defense. Hands on experience required.

  • Performs threat, vulnerability, and risk assessments and manage security audits.

  • Coordinates the handling and resolution of incidents of security breach and day-to-day operations and maintenance of security tools.

  • Evaluates and recommends tools and/or configurations including but not limited to the following: secure remote access, email security, web content filtering, endpoint security settings, data loss prevention, etc.

  • Develop and implement security plan, standards, guidelines and procedures to ensure ongoing maintenance of security.

  • Develop and lead routine exercises (such as tabletops) to evaluate the efficacy of the security partners. Sets standards for improvements for vendors related to people, process, or technology following each exercise.

  • Monitors internal control systems to ensure that appropriate information access levels and security clearances are maintained.

  • Performs information security risk assessments and serve as the internal auditor for information security processes. Demonstrates expert-level knowledge and skills in the technical, process, organizational, and philosophical aspects of information technology, information security, and information risk management disciplines.

  • Oversees penetration testing requirements, assessments, and tracks remediation of critical findings.

  • 5 + years of experience

  • Other duties as assigned


 



 



 



Job Requirements



 



 



 



 



Relevant Experience, Education, Certification, Knowledge, Skills and Abilities



 




  • Bachelor’s degree in management information systems, computer science, or related discipline is     required.

  • Postgraduate degrees and certificate programs in relevant areas that demonstrate analytical writing will also be considered.

  • CISSP certified/qualified or ability to pursue obtaining these certifications within six months of hire

  • SANS GCIH or GCFA, CISA, CISM, EnCER certification(s) and preferred but not required


 

Skills and Requirements:


  • Advanced knowledge of information systems security concepts and technologies; network architecture; general database concepts; document management; hardware and software troubleshooting; intrusion tools and open source alternatives

  • Advanced knowledge and understanding of PCI standards an requirements to meet the standards

  • Familiarity with security regulatory requirements and standards (such as NIST 800 series, ISO 2700x series, GLBA, FFIEC)

  • Knowledge and experience with the Windows, iOS, Android, and Linux operating systems

  • Knowledge and experience with Encryption at rest and in transit: CIFS/SMB/Active Directory/NTLM/Kerberos/MS-domain services/windows firewall/LDAP

  • Network Security: Firewall, IPS,  Anti-Bot, Sniffers, Decoders, SIEM Solutions, Email gateways, Anti-SPAM solutions, Web Filtering, Proxy servers, Data Loss Prevention Systems, SSL offloading, balance loaders

  • Knowledge and experience with Common Internet Protocols: IP, TCP, UDP, ICMP, FTP, SMTP, SSH, DNS, DHCP, SNMP, HTTP, HTTPS, NTP

  • Experience with Incident Response, Security Appliances, Web Application testing, and Vulnerability Management


 

Other Functions:


  • Ability to work extremely well under pressure while maintaining a professional image and approach

  • Exceptional information analysis skills;  ability to perform independent analysis and distill relevant findings and root cause

  • Ability to make decisions under pressure, and effectively communicate the decision, reason, and impact.

  • Strong analytical writing skills to articulate complex ideas clearly and effectively; experience creating and presenting documentation and management reports

  • Team player with proven ability to work effectively with other business units, IT management and staff, vendors, and consultants

  • Strong communication skills such as planning and leading effective meetings, conducting structured interviews to collect information, interpersonal and negotiation skills, and presenting to a variety of audiences

  • Advanced skills to present information to stakeholders and/or decision makers in an effective and professional deliverable


 



 



 



 



 



Physical Environment



 




  • Some travel may be required

  • Most work is performed in a temperature-controlled office environment.

  • Incumbent may sit for long periods of time at desk or computer terminal.

  • Incumbent may use calculators, keyboards, telephone, and other office equipment in the course of normal workday.

  • Stooping, bending, twisting, and reaching may be required in completion of job duties.



 


 

 

The above statements are intended to describe the general nature of the work performed by the employees assigned to this job. All employees must comply with Company policy and applicable laws.  The responsibilities, duties and skills required of personnel so classified may vary within each department and/or location.





More jobs in Stillwater, Minnesota

Other
about 3 hours ago

Circana
Other
3 days ago

Zen Educate
Other
6 days ago

Zen Educate
More jobs in Software

Software
1 day ago

Cigna
Software
8 days ago

Flextronics International USA, Inc
Software
11 days ago

Allied World