Required Education:
Bachelor’s degree in computer science, information assurance, MIS or related field, or equivalent.
Preferred Education:
Preferred (not required): CISSP, CISM and/or SANS certification a plus.
Required Skills:
• Highly technical and analytical expertise, with a proven deep background (preferred 5+ years’ ITS experience in addition to cybersecurity) in technology design, implementation and delivery.
• Experience with purple teaming (red and blue) to train, identify and remediate issues cohesively.
• Experience in cloud computing technologies, including software-, infrastructure and platform-as-a-service, as well as public, private, and hybrid environments.
• Extensive knowledge of traditional security controls and technologies, such as Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), public key infrastructure (PKI), identity and access management (IDAM) systems, antivirus and firewalls, in addition to newer offerings such as endpoint detection and response (EDR), threat intelligence platforms, security automation and orchestration, deception technologies and application controls.
• Skilled in meeting vulnerability and penetration testing requirements.
• Excellence in communicating business risk from cybersecurity issues.
• Experience managing SIEM systems, threat intelligence platforms, security automation and orchestration solutions, IDS/IPS, file integrity monitoring (FIM), data loss prevention (DLP) and other network and system monitoring tools.
• Track record of acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating effectively.
Preferred Skills:
Preferably at least 7+ years’ experience in cybersecurity, including compliance and risk management with a system and network security engineering background.
The Information Security Engineer will be a part of the Enterprise Identity team, focused to mature the program using both Okta (IAM) and SailPoint (governance).
• This position will work within a team of professionals to tackle key initiatives such as automating mover, joiner, leaver activities and streamline the user experience.
Ideal Candidate Profile:
• Seasoned cyber security professional specializing in identity and access management/governance.
Top Skills Required (in order of preference)
• Identity and access management experience specifically in Okta.
• Identity governance experience with SailPoint, Okta, or similar.
• Ability to communicate effectively and work in a team environment.
• Daily workflow assignments this contractor would be responsible for completing or supporting.
• Progress the Information Security department roadmap including Enterprise Identity.
• Engineer quality, fault tolerant solutions that can be used enterprise-wide for enterprise identity and governance.
• Continually expand their knowledge of enterprise identity / governance as well as other Information Security verticals.
• Knowledge transfer to other information security workforce members
• Show up mission driven, with an eye for accomplishing tangible results as assigned.
Years of experience
• Preferably at least 7+ years’ experience in cybersecurity, including compliance and risk management with a system and network security engineering background.
• Highly technical and analytical expertise, with a proven deep background (preferred 5+ years’ ITS experience in addition to cybersecurity) in technology design, implementation, and delivery.
Proficiency in OTKA REQUIRED.
• SailPoint a plus.
Essential Job Functions
• Responsible for implementing, maintaining, monitoring, and managing secure solutions. The engineer delivers these solutions in accordance with the organization’s architectural designs, best practices, and regulatory or compliance requirements. Reporting to the Director Information Security and is expected to contribute to the corporate security strategy with security leadership and other senior security technologists. Recipients of the engineer’s implementations and management include ITS infrastructure, application development, security operations, security audit and end users. With an emphasis on securing systems, applications, third-party connections, service providers and ancillary systems, the Information Security Engineer is responsible for securing business-to-business initiatives, third-party relationships, outsourced solutions and vendors. Considered a highly knowledgeable individual, the Information Security Engineer is expected to implement, monitor and manage secure solutions that address modern day issues.
• Handle day-to-day implementation, monitoring and operational support of hardware, software, customer applications, managed solutions and service provider relationships.
• Actively participate and lead security team meetings that facilitate secure design.
• Engage in information security projects that evaluate existing security infrastructure and propose changes as defined by security leadership and architects. Additionally, deliver projects on time, within budget and in accordance with service level agreements (SLAs).
• Assist with incident response and system stability issues as they occur. This may include involvement outside of regular work hours, and responsiveness is expected.
• Work in tandem with architects, the security operations center (SOC), incident responders (in cases of anomalous activity and host compromise), and technology infrastructure and development team members.
• Respond to and handle service and escalation tickets within SLA expectations.
• Develop security test plans from architectural design. Identify deficiencies and make enhancements to ensure production is not impacted.
• Follow security engineering fundamentals and processes as outlined in standard frameworks
• Influence the planning and execution of incident response and postmortem exercises, with a focus on creating measurable benchmarks to show progress (or deficiencies requiring additional attention).
• Focus on driving security efficiencies, enabling security team members to work on more advanced tasks.
• Conduct performance testing to stress the limitations of security solutions while at the same time ensuring business innovation and day-to-day processes are not negatively impacted.
- **Only those lawfully authorized to work in the designated country associated with the position will be considered.**
- **Please note that all Position start dates and duration are estimates and may be reduced or lengthened based upon a client’s business needs and requirements.**
I am very happy with the Rose International, and the professionalism of the employees.
Robin, Consultant
Rose International maintained good communication during assignments and are very informative through email and phone calls.
Sade, Consultant
I believe the best thing that Rose HR has going for it is the incredible responsiveness. Everyone is very quick to reply to any concerns, and contacts the contracted employees very quickly and efficiently.
Kevin, Consultant
I have been very pleased with my experience with Rose International. Everyone that I encountered was very helpful and courteous.
Stephanie, Consultant
You are customer service oriented. No matter whether it was the Recruiter or someone in Human Resources/Payroll, you were responsive. That to me is key!
Tonya, Consultant
EMPLOYEE COMMENTS