Bachelor's Degree in Computer Science, Information Security, or related field (or related work experience)
Typically minimum 4 years of relevant experience, including network operations or engineering or system administration on Unix, Linux
Responsibilities
Evaluates, tests, recommends, develops, coordinates, monitors, and maintains information security policies, procedures, and systems, including hardware, firmware, and software
Ensures that IS security architecture/designs, plans, controls, processes, standards, policies, and procedures are aligned with IS standards and overall IS security
Identifies security risks and exposures, determines the causes of security violations, and suggests procedures to halt future incidents
Investigates and resolves security incidents and recommends enhancements to improve security
Develops techniques and procedures for conducting IS security risk assessments and compliance audits, the evaluation and testing of hardware, firmware, and software for possible impact on system security, and the investigation and resolution of security incidents
Proactively monitors complex systems and responds to known and emerging threats against the Global Payments network via intrusion detection software
Completes detailed, comprehensive investigations of security issues by reviewing security log data, interpreting data in support of security event management processes from various data feeds, and triages a wide variety of security events
Performs incident handling processes by maintaining knowledge in implementation of containment, protection, and remediation activities
Keeps up-to-date knowledge of new and emerging threats that can affect the organization's information assets by analyzing third-party software/solutions, IT configuration changes (including access control requests), and network/system architecture from a risk perspective
Designs and configures security systems, including proxy, remote access, mail gateway, intrusion prevention, wireless networking, data leak prevention, security information and event management, and web application firewalls
Provides input in assessing and disseminating threats related to the enterprise regarding current vulnerabilities by managing and developing an emerging threat model
Assesses risks based on changes to implementation of ISO/BSO; enhances knowledge of PCI/Logical Security guidelines and models, HIPAA, PII, and Card personalization
Creates cost-effective solutions for system/application development regarding Information Security processes and concepts in applicable systems and software
Performs day-to-day Information Security functions pertaining to computer access control on numerous security software products and processes
Enhances understanding of business objectives and helps provide direction based on risk, Corporate Policy, and association and regulatory guidelines
Participates in developing long-term strategies for conducting system penetration, vulnerability, and web application testing, risk assessments, and policy creation