Posted: Wednesday, December 27, 2017 12:35 PM
Responsible for installing, implementing, administering, monitoring, and maintaining all security architecture technology solutions at an advanced level. Investigate, document, and report threats and vulnerabilities. Provide internal security assessments of all new technology, processes, systems, and projects. Models appropriate behavior as exemplified in MLH Mission, Vision and Values.
Associates degree in Information Technology or related field.
Must have at least two (2) years of information security experience in designing, deploying, managing, monitoring, and evaluating advanced cybersecurity solutions.
Credentialed in one or more of the following:
Security+, CISSP, CISM, CEH. or GSEC
BS in Computer Science, Business, Health Care or closely related discipline.
Five (5) years of applicable information security experience in designing, deploying, managing, monitoring, and evaluating advanced cybersecurity solutions.
Five (5) years of applicable advanced information security experience in designing, deploying, managing, monitoring, and evaluating advanced cybersecurity solutions in lieu of credential requirements.
:Extensive knowledge of security architecture technology solutions such as firewalls, intrusion prevention systems, Security Information and Event Management (SIEM), vulnerability scanning and management, anti:virus management, certificate management, and data loss prevention (DLP).
:Ability to assess security incidents or risks, gathers needed information, and finds appropriate solutions.
:Ability to analyze processes and recommend improvements based on foundational knowledge.
:Ability to manage small projects and implementations with little supervision.
:Advanced computer, network, and system knowledge and skills with a thorough understanding of security controls.
:Ability to use basic office productivity tools and manage time.
:Ability to communicate project status to management and other stakeholders. Present in front of small groups. Document processes. 13;
Key Job Responsibilities 13;
:Installs, implements, administers, monitors, and maintains all security architecture technology solutions.
:Monitor network, systems, and logs to ensure availability to all systems. Investigate and respond to all potential incidents in accordance with prescribed procedures and perform data forensics to help determine scope and root cause of the security incidents.
:Facilitate periodic risk assessments, penetration tests, and vulnerability assessments and make security enhancement recommendations to management.
:Research, evaluate and recommend information:security related hardware and software to maintain a strong security posture, including developing business cases for security investments. 13;
Physical Requirements 13;
:Subject to call back at all times.
:Required to sit for extended periods.
:Subject to standard office working conditions with intermittent exposure to noisy computer equipment.
:Ability to withstand occasionally stressful working conditions due to tight project schedules and hardware or software problems.
:Ability to understand complex verbal and written communications, and respond verbally or in writing as appropriate. Typical mediums of communication include face:to:face dialog, telephone, memos, and electronic mail.
:Ability to read and understand technical manuals and other documentation to determine correct action, safety precautions, and other conditions of proper hardware and software operation.
:Ability to work varying hours due to the accessibility of individuals or equipment involved in different projects, the need to minimize system downtime or user interruption, or
• Location: Memphis
• Post ID: 33317527 memphis