Process Design: Develop and implement efficient and effective process designs to enhance security operations.
End-to-End Testing: Conduct comprehensive end-to-end testing of security processes and systems to ensure robustness and reliability.
Automation: Design and implement automation solutions using tools such as Ansible, Puppet, or Chef to streamline security processes and reduce manual intervention.
GIP Governance: Oversee and ensure compliance with Global Information Protection (GIP) governance frameworks.
Information Security Analysis: Perform thorough information security analysis using tools like Splunk, Wireshark, and Nessus, leveraging at least 4 years of relevant experience or equivalent through work, consulting, training, military, or education.
Cybersecurity Policy and Frameworks: Stay updated with cybersecurity policies and industry frameworks such as NIST, ISO 27001, and CIS Controls, ensuring the organization's practices align with these standards.
Business Needs Translation: Translate business requirements into effective application and automation solutions.
Policy Adherence: Implement and maintain procedures to ensure adherence to security policies and mechanisms.
Process Design Knowledge: Apply in-depth knowledge of process design principles to improve security operations.
Certification: Maintain a Certified Information Systems Security Professional (CISSP) certification or a similar credential.
Qualifications:
Bachelor's degree in Information Security, Computer Science, or a related field.
Minimum of 4 years of experience in information security analysis or equivalent.
Proven experience in process design and end-to-end testing.
Strong automation skills and experience with tools such as Ansible, Puppet, or Chef.
In-depth knowledge of GIP governance and cybersecurity policies.
Familiarity with security analysis tools like Splunk, Wireshark, and Nessus.
Ability to translate business needs into technical solutions.
Experience in implementing and maintaining policy adherence procedures.
CISSP or similar certification is required.
Skills:
Excellent analytical and problem-solving skills.
Strong communication and interpersonal skills.
Ability to work independently and as part of a team.
Detail-oriented with a focus on accuracy and quality.
Proficiency in security tools and technologies such as SIEM systems, vulnerability scanners, and threat intelligence platforms.
By providing your phone number, you consent to: (1) receive automated text messages and calls from the Judge Group, Inc. and its affiliates (collectively "Judge") to such phone number regarding job opportunities, your job application, and for other related purposes. Message & data rates apply and message frequency may vary. Consistent with Judge's Privacy Policy, information obtained from your consent will not be shared with third parties for marketing/promotional purposes. Reply STOP to opt out of receiving telephone calls and text messages from Judge and HELP for help.
Contact: jvigil@judge.com
This job and many more are available through The Judge Group. Find us on the web at www.judge.com