Bachelor’s Degree, ideally in technology related field, or equivalent work experience
Demonstrable knowledge of information security best practices
Excellent teammate skills, effectiveness both in independent and collaborative work
Ability to learn and use new technologies
Strong understanding of Key Management framework and best practices around Bring Your Own Key and Hold Your Own Key
Experience with Entrust nShield HSMs and Cryptographic Security Platform systems
Responsibilities
Setting up Encryption using Technologies such as Secupi, Microsoft Purview
Setting up DLP Policies in Microsoft Purview, Microsoft Defender for Cloud Apps (CASB), Zscaler and Microsoft Defender for Endpoint
Assisting the Implementation of Data Loss Prevention and guide on unit testing, and support documentation
Determining operational feasibility by evaluating, analyzing, problem definition, requirements, solution development, and proposing solutions
Collaborating with Enterprise Architecture organization as needed
Document processes or procedures, and recommend where improvements can be implemented
Serve as a security ambassador, raising data protection awareness across the organization, evangelizing data protection best practices, and helping make Northern Trust a security forward organization
Provides reports on the effectiveness of the business unit’s internal control structure along with recommendations to improve the effectiveness, efficiency and economic value of a control or a process
Assessing audit findings/gaps including control weaknesses with an appropriate degree of professional skepticism, seeking to fully understand risks to Northern Trust, and assist technology partners with the development of remediation plans to mitigate weaknesses, providing thought leadership on the appropriateness of the plan
Assessing baseline configurations of system/infrastructure components and their technical controls, work with security engineers to recommend security controls to system owners to mitigate identified security weaknesses, establish remediation plans, and monitor for effective implementation
Assessing vulnerabilities using a risk based approach, working with system owners to establish remediation plans, and monitoring for effective implementation
Analyzing trends and changes in the threat environment with respect to organizational risk; developing and executing plans to address identified risks
Ensuring the integrity of sensitive data across enterprise systems and secure management of cryptographic keys and work with consultants and management for protecting the Northern Trust’s data
Conduct security monitoring, security incident identification, incident prioritization, incident escalation and directed response support functions