Job title: Cybersecurity - Senior
Job Location: Dallas, TX
Top Skills Cybersecurity Risk and Controls Identity and Access Management Control Process Definition and Documentation Capability and Maturity Model
Overall Purpose:
- Responsible for cybersecurity areas across products, services, infrastructure, networks, and/or applications while providing protection for Client, our customers and our vendors/partners.
- Works with senior team members on various projects relating to the protection of devices, customers, assets, data, information technology, and networks.
- Supports innovation, strategic planning, technical proof of concepts, testing, lab work, and various other technical program management related tasks associated with the cybersecurity programs.
Roles and Responsibilities: - Ideation, testing, proof of concept, and support for various cybersecurity related projects.
- Analysis of complex security issues, and development and engineering activities to help mitigate risk.
- Analyzes various hardware and/or software solutions recommending purchases and identifying modifications to fit Client's cybersecurity needs and that of our managed services teams.
- Develops policies and procedures to minimize network intrusion, malware events, and vulnerability issues for internal and external customers.
- Interact with internal and external stakeholders, including Vendors, external Business Partners, Application Development, additional technical support team members, and Leadership to provide technical assessment, analysis, and problem solving through to resolution.
- Applies measures to block malicious code and applications. Includes forward looking research, planning, and strategy to strengthen our stance against future cybersecurity threats, and enhance our mitigation techniques and technology solutions.
- Areas of work in this include, but are not limited to: Cyber Incident Response, cyber product testing, cyber risk & strategic analysis, cyber research, cyber awareness & training, cyber vulnerability detection & assessment, cyber intelligence & investigation, cyber networks & systems engineering, cybersecurity application testing, cyber digital forensics & forensics analysis, cyber software assurance, cyber business operations & support, cyber application development & testing, cyber operational support, cyber IoT planning & testing, cyber policy & requirements & standards.
- Cybersecurity Risk and Controls Identity and Access Management Control Process Definition and Documentation Capability and Maturity Model