Bachelor's Degree (preferred in Information Security or Computer Science; other majors considered)
Typically a minimum of 6 years related professional experience
Prefer a minimum of 1-2 years experience in a supervisory position
One or more of the following - CIS (certification, incomplete in description)
Responsibilities
Develops and leads highly technical and specialized areas within information security: Security Engineering, Security Architecture, Forensics Analysis, Threat Analysis, Threat Hunting, and Penetration Testing
Manages the development, deployment, and execution of enterprise security controls and defenses
Monitors, analyzes, and exploits system vulnerabilities to detect potential threats
Executes containment, mitigation, and protection processes to safeguard against real-time threats while maintaining critical documentation and evidence
Determines risk and exposure from security breaches, resolves incidents, and provides guidance to business decision-makers
Tracks and supports the delivery of information security solutions
Manages the tactical activities of installing and configuring security systems, software, and applications
Coordinates responses to intrusions and provides remediation guidance and support
Coordinates resources on highly complex development projects, including approval of design specifications and scope
Provides input to short-term security technology roadmaps regarding applicability of new technologies
Disseminates updates to InfoSec Architectural policies, standards, and guidelines to team members
Reviews forensic investigations and analysis of reported cyber incidents to evaluate root cause vectors and necessary control measures to prevent future occurrence
Implements appropriate countermeasures to recover deleted, hidden, or lost user data
Coordinates research and analysis of threat actor profiles and associated indicators to detect potential threats
Implements recommended actions and security tools to identify, monitor, and mitigate attacks
Coordinates with external security organizations to exchange threat intelligence
Coordinates complex threat assessments to evaluate incident impact and risk exposure
Reviews cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies), and draws conclusions on possible implications or applicability
Guides the threat intelligence collection process to enhance analytical capabilities
Manages execution of penetration testing activities on core systems
Articulates the outcome of simulated attacks and underlying security issues or system weaknesses
Recommends and institutes remediation techniques or improvements to protect and maintain security frameworks and controls
Supports the evaluation and selection of security applications and systems
Manages the implementation of access control defenses
Provides quality review on the evaluation and documentation of team procedures
Manages development, deployment, and support activities for multiple critical security technologies, including problem resolution and management, application maintenance, project requests, and system enhancements