Knowledge of enterprise IT architectural concepts and patterns (e.g., baseline, validated design, and target architectures)
Ability to determine how a security system should work, including resilience and dependability, and how changes in conditions or the environment will affect these outcomes
Ability to map system configuration details to Security Policy Controls
Proven expertise in specific security technologies (e.g., SIEM, DLP, IAM, cloud security)
Requirements:
Identify and prioritize critical business functions in collaboration with organizational stakeholders
Perform security reviews, identify gaps in security architecture, and develop a security risk management plan
Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements documents
Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately
Job description
Ideal Candidate Profile: Seeking an experienced Information Security Engineer to join the IT Security team. The ideal candidate will possess in-depth knowledge of creating governance documentation for Security Tools and Services.
Job Duties & Responsibilities:
Identify and prioritize critical business functions in collaboration with organizational stakeholders.
Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements documents.
Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately
Communicate and collaborate with Information Security Engineers and System administrators to collect environment variables and configurations
Required Skills & Experience
Knowledge of the enterprise information technology (IT) architectural concepts and patterns (e.g., baseline, validated design, and target architectures.)
Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
Communicate and collaborate with Information Security Engineers and System administrators to collect environment variables and configurations.
Ability to map system configuration details to Security Policy Controls. Proven expertise in specific security technologies (e.g., SIEM, DLP, IAM, cloud security)