Job Duties & Responsibilities: The core responsibilities of this position will be:
Drive the long term Data Protection, tech road map and driving continual optimization
Lead enterprise Data Protection projects, provide assessment of compliance to policies and standards, research solutions and provide guidance to project teams to resolve shortcomings
Identify, select and develop architecture artifacts (reference architectures, standards, policies, reusable designs, principles, models, frameworks, guidelines, and best practices) across data protection topics
Provide technical oversight, drive change and provide guidance thru a cross-enterprise services program to ensure that the proper technical capabilities exists to support the business, and can sustain required security, availability, reliability and resiliency levels for Data Protection
Qualifications:
Proficient in the use of pen-testing tools and techniques for web systems.
10 or more years of hands-on experience in IT Security with a focus on data systems, IT security systems engineering, or software engineering, at least 5 of which have been at Enterprise level
15 years total experience in IT field
10+ years experience in IT security requirements analysis, design, development, unit testing and operation of distributed, fault-tolerant security solutions with particular attention to security, scalability, performance, availability and cost/revenue optimization
Demonstrates expertise and leadership in working with business units, product management, development and operations to architect innovative solutions that meet the requirements with respect to functionality, performance, scalability, and reliability, realistic implementation schedules and adherence to architectural goal and principles.
Experience with high volume data processing (database, file systems, etc.) systems or large transaction client-server systems; experience with mobile, wearable computing, 3D printing and other emerging technology trends
Working knowledge of TOGAF, Zachman, Agile Architecture, FEA or other enterprise architecture methodologies
Broad experience across business, application, information, infrastructure and security architecture domains
Broad experience across business analysis, product design, engineering, QA, operations and sustainment in a large corporation / enterprise environment
Presentation skills, verbal, written
Ability to work in fast paced environment, problem solve, work independently
Proficient in the use of enterprise architecture, diagraming and documentation tools
Essential Functions:
Conduct recurring internal penetration tests and document results.
Implement and maintain a compliance and vulnerability management program designed to assure protection of assets
Conduct regular scans of computing platforms to detect the presence of unauthorized software
Perform periodic audits of outsourced security operations (rogue device scans, account management, etc.) to validate compliance with security policies and requirements and report audit results to leadership and IT
Leverage security related data from internal sensors (e.g. SIEM, firewalls, IDS, routers, proxies, hosts, and Advanced Persistent Threat technologies deployed internally) and external sources (vendors, industry working groups, law enforcement etc.) in an effort to implement effective mitigations, and reviewing appropriate data sources for indications of adversarial activity.
Audit server OS and software asset versions to ensure they are kept up to date
Coordinate white hat penetration tests and oversee remediation and documentation of detected vulnerabilities
Integrate into SDLC process and perform regular vulnerability scanning to detect vulnerable code and/or solution design prior to deployment to staging and production
Develop and Publish reports demonstrating regular vulnerability scanning and vulnerability remediation and trends over time
Perform ad-hoc vulnerability scan requests as directed in response to security breaches and/or pending attacks
Assesses threats to the environment and provide input into security architectures and designs
Develops, researches and maintains proficiency in tools, techniques, countermeasures and trends in computer and network vulnerabilities
Respond to emerging threats such as APT and other forms of targeted attacks, organized crime, etc.
Perform detailed forensic analysis of assets, including logs, malware samples, hard drive images, etc.
Reconstruct events of a compromise by creating a timeline via correlation of forensic data.
Perform malware analysis and other attack analysis to extract indicators of compromise.
Implement and manage tools and technologies for indicators of compromise and other threat intelligence.
Ensure that, where appropriate, all forensic investigations are recorded and tracked to meet audit and legal requirements
Mentor and train more junior analysts in intrusions and intelligence-driven network defense techniques and skills
Conduct root cause analysis to identify gaps and recommendations ultimately remediating risks to the business
Performs other duties as assigned
