This job description summarizes the main duties of the job. It neither prescribes nor restricts the exact tasks that may be assigned to carry out these duties. This document should not be construed in any way to represent a contract of employment. Management reserves the right to review and revise this document at any time.
Functions as expert consultant in all aspects of information security. Prepares in-depth studies and analyses. Manages major information security efforts. Maintains affiliation with national/international organizations. Functions on broad scope programs of national/international basis. Performs independent work or manages a team in support of a customer either on site or of-site.
Manages security systems, and analyzes potential threats and vulnerabilities to client systems. Develops new computer and network security systems, including both hardware and software.
Oversees technical incident response and remediation activities for client environments.
Provides security analysis and consultation services for product, system and network architecture designs.
Analyzes network traffic and alerts to assess, prioritize and differentiate between potential intrusion attempts and false alarms.
Launches and tracks investigations to resolution.
Composes and sends alert notifications.
Analyzes and reviews security findings and data.
Publishes reports and keeps metrics for client systems.
Identifies trends and root causes of system failures or vulnerabilities.
Maintains vendor and trusted partner relationships.
Develops tools for operational use and analyzes current threats to information security and systems.
Ensures that the Information Systems Security department's policies, procedures, and practices as well as other systems user groups are in compliance.
Ensures that the physical environment of the computers and their terminals are properly secured.
Performs off-site audits to check on disaster recovery program effectiveness as needed.
Conducts user training to ensure systems security and improve main frame efficiency.
Conducts structured walk-throughs to ensure integrity of system applications.
EDUCATION & EXPERIENCE:
Typically requires a bachelor's degree or equivalent and 10 to 12 years related experience.
Master's degree or doctorate in field mathematics, telecommunications, electrical engineering, computer engineering, or computer science is preferred.
PHYSICAL DEMANDS: Normal demands associated with an office environment. Ability to work on computer for long periods, and communicate with individuals by telephone, email and face to face. Some travel may be required.