Job Description (Must have 7-15years)
Technical/Functional Skills:
- Windows, UNIX and Linux operating systems Security assessment of Store Systems and ERP Implementations such as Oracle Fusion or Oracle ERP Solutions
- Threat detection and analysis on Stores networks and application(s) hosted on SaaS Cloud Platforms.
- VB.NET, Java/J2EE, ColdFusion, API/web services, scripting languages and a relational database management system (RDBMS) such as MS SQL Server or Oracle
- Thorough understanding of relevant industry security standards and protocols including ISO27001 and National Institute of Standards and Technology (NIST); Control Objectives for Information and Related Technologies (COBIT); Committee of Sponsoring Organizations (COSO) of the Treadway Commission, a joint initiative to combat corporate fraud
- The ISO 27001 specifications for an information security management system
- Router, switch and VLAN security; wireless security
- Risk assessment procedures, policy formation, role-based authorization methodologies, authentication technologies and security attack pathologies
Experience Required:
- Utilizing emerging technologies to design and implement security solutions; monitoring and improving those solutions while working with an information security team
- Consulting and engineering in the design and development of security best practices; implementation of security measures to meet business goals, customer needs and regulatory requirements
- Security considerations of cloud computing, including data breaches, hacking, account hijacking, malicious insiders, third parties, authentication, APTs, data loss and DoS attacks
- Identity and access management; tracking and creating/enforcing policies that govern access sensitive technology resources and information assets.
Roles & Responsibilities:
- Develop a complete understanding of a company’s technology and information systems
- Design, build, implement and support enterprise-class security systems
- Align organizational security strategy and infrastructure with overall business and technology strategy
- Identify and communicate current and emerging security threats< /span>
- Design security architecture elements to mitigate threats as they emerge
- Plan, research and design robust security architectures for any IT project
- Perform or supervise vulnerability testing, risk analyses and security assessments
- Create solutions that balance business requirements with information and cybersecurity requirements
- Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
- Review and approve installation of firewall, VPN, routers, IDS scanning technologies and servers
- Test security systems to ensure they behave as expected
- Use current programming language and technologies to writes code, complete programming and performs testing and debugging of applications
- Provide supervision and guidance to a security team
- Define, implement and maintain corporate security policies and procedures
- Train users in implementation or conversion of systems
- Respond immediately to security-related incidents and provide thorough remedial solutions and analysis
- Regularly communicate vital information, security needs and priorities