Overview
As an Information Security Engineer I, you’ll drive critical information security initiatives, investigating security events, and providing guidance, recommendations, and requirements with regard to information security elements in other projects and business initiatives. The candidate will actively collaborate and influence others to ensure information security risks are prioritized, assessed, and managed. The candidate will have the opportunity to help shape the organization’s information security strategy.
Responsibilities
- Plans, develops, and implements proven high-tech solutions to increase security and defend against hacking, malware and ransomware, insider threats, and other types of cybercrimes.
- Oversees monitoring of computer networks, identifies security issues, and anticipates security breaches.
- Executes the installation and maintenance of security programs, plans, and software, including firewalls and data encryption programs.
- Assures protection of the organization's data and infrastructure by enabling the appropriate security controls.
- Investigates and analyzes security breaches and cyber security incidents to determine the source of the issues, and assesses the damaged caused.
- Documents all parts of security incidents or breaches.
- Performs assessments and penetration tests to identify network and system vulnerabilities, troubleshoots security and network problems, determines the best way to avoid them, and responds to system or network security breaches.
- Oversees security technology and audit or intrusion systems.
- Develops and handles secure network solutions to protect against advanced persistent threats.
- Keeps abreast of industry security trends and developments, as well as applicable government regulations.
- Performs other duties and responsibilities as required by the role and determined by management.
Qualifications
- Extensive previous experience with Okta: Lifecycle Management, Okta Workflows, Single Sign On, Multi-Factor Authentication
- High degree of understanding of Identity and Access Management principles and processes (e.g. Least Privilege, Building Role-based Access Control matrices, etc.) as well as the ability to execute these effectively in a complex environment
- Strong understanding of technologies and methods across IT systems and information security tools as it applies to identity management and access control
- Experience with Identity and Access Management related compliance controls and frameworks (e.g. NIST 800-63)
- Strong verbal and written communication skills
- Experience communicating and presenting with confidence and clarity to different audiences, adjusting language and jargon appropriately
- Experience writing documentation (technical, policies, procedures, etc.) to be consumed by a wide range of audiences (technical, leadership, end users, customers, auditors, etc.) with high quality
- Ability to articulate complex application architecture, configuration, and operation to others in both technical and non-technical terms
- Must be able to work well with others and promote a highly collaborative work environment
- Must conduct oneself with the utmost integrity and practice a high degree of ethical judgment
- Strong understanding of risk management concepts and terminology
- Experience with methodologies designed to drive continuous improvement efforts
- Experience in management of security projects and complicated security issues
- Self-motivated and able to work independently with little oversight to complete tasks and deliverables on time
- Must be able to multi-task and juggle multiple priorities while ensuring successful completion of all objectives in a timely fashion
- Ability to demonstrate troubleshooting skills, analytical thinking, and the ability to work with a wide range of technologies relating to mature Identity and Access Management
- Active in the cybersecurity industry, equipped with external networking relationships to maintain relevant knowledge of best practices, tactics, strategies, and technologies
- BA/BS degree strongly preferred, will consider comparable work experience
- 4-6 years of relevant experience is preferred.
- Rarely makes the same mistake twice; learns from failure.
- Begins to focus on attaining expertise in one or more areas of their role.
- Learns quickly and makes steady progress without the need for constant significant feedback from more senior team members.
Equal Opportunity Employer/Protected Veterans/Individuals With Disabilities
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c)
LA County Applicants: The Company will consider qualified applicants, including those with criminal histories, in a manner consistent with applicable state and local laws.
Profit Center
PC-1015