Search for More Jobs
Forward this job to a friend
Apply by email without Registering
Apply by creating/using account
Please enter your registered email address, and we'll email you a link to reset your password right away.
KEYWORDS : CISSP, CISA, CLOUDERA, AZURE, , Vendor risk management OR Third party security audit
Able to evaluate, implement and manage security solutions.
Able to lead security projects and cross functional project teams.
Able to implement and manage security policies, procedures and incident response strategies.
Protects against unauthorized access, modification, or destruction of information assets.
Works with end users to determine needs of individual departments.
Hands on experience in Azure or AWS Security
Ability to setup monitoring of security events in cloud
Conduct Access Control review of applications database and OS on cloud
Hands on experience in Cloudera security or Hadoop Security
Implements policies or procedures, and tracks compliance.
Familiar with a variety of Information Security concepts, practices, and procedures.
Security tool system administration
Functions as a system (or backup) administrator for 4 or more security tools.
Makes recommendations to improve the functionality of the security tools to improve security posture and/or customer experience.
Identify unsuccessful and successful intrusion attempts by reviewing and analyzing security events logs and event summary information.
Conduct third party security or audit
Ensure the integrity and protection of networks.
Monitor logs for potential, successful and unsuccessful intrusion attempts.
Communicate intrusions and compromises to team leaders.
Monitor and investigate alerts, determining root cause and appropriate mitigations.
Works with end users to determine needs of individual departments, implementing policies or procedures.
Able to serve as a subject matter expert on security projects/initiatives.
Works under general supervision.
Work as part of a team to lead elements of larger security projects.
Through various consultative methods (PER process, meetings, service requests, etc.) work with our customers to review their requirements and access the overall security.
Provide recommendations to improve security while achieving the business goal.
Understand that we must enable the business while securing it.
Conduct risk/vulnerability analysis on projects/new technology, providing remediation steps as appropriate.
Stay current on threats affecting the industry as a whole; provide recommendations to address as appropriate.
Stay current on emerging technology and provide recommendations on how MH could use this technology to improve security.
Keeps management advised during the incident.
Creates appropriate documentation of the incident including lessons learned and ways to minimize a repeat incident.
BS in IT, Computer Science, Management Information Systems or equivalent degree preferred. Work experience may be substituted.
At least 10 years of IT experience with at least 5 7 years of system/network security experience, including threat modeling, threat assessments, risk identification techniques, penetration testing.
Security certification desired (e.g., CISSP, ISSMP, ISSAP, GIAC, CEH)
Apply by creating/using account