Vacancy expired!
Role: Assist with implementation, maintenance and monitoring of the strategic, comprehensive enterprise cybersecurity and IT risk management program. Support the vision of the Cybersecurity Program and its objectives necessary to manage the risk to the organization and will ensure business alignment, effective governance, system and product availability, integrity, and confidentiality.
Responsibilities:- Responsible for proactively uncovering digital vulnerabilities within our environment and ensuring information assets and technologies are adequately protected.
- Responsible for monitoring SIEM and analyzing potential threat events.
- Responsible for Threat Hunting and identifying potential Indicators of Compromise (IOC’s).
- Support and be responsible for Vulnerability Management and Pen Testing.
- Manage schedule and mix of external and internal vulnerability scans, manual security testing.
- Provide/communicate testing reports, presentations, and briefings
- Responsible for overseeing Technology governance and policies.
- Responsible for configuration of IDS systems, analyze firewall traffic.
- Participate in cybersecurity strategy, security awareness programs, security architecture, and security incident response.
- Educate employees on appropriate cybersecurity risk and mitigation strategies
- Collaborate with IT compliance team(s) as needed and coordinates the IT component of both internal and external audits, federal and state examinations to ensure cybersecurity programs’ compliance with relevant laws, regulations, and policies.
- Maintain and publish up-to-date cybersecurity policies, standards, and guidelines.
- Evaluate new cybersecurity threats and IT trends and develops effective security controls.
- Support cybersecurity awareness programs.
- Support effective disaster recovery policies and standards to align with company business continuity management program goals. Ensures business critical services are recovered in the event of disasters or other incidents, and provides support, and in-house consulting in these areas.
- Respond to potential security breaches, coordinates response, and recommend corrective actions.
- Maintain current knowledge of industry and regulatory trends and developments for the enterprise technology.