Oct 29, 2018
Sandy Springs, GA, US, 30328
Secondary Location: Not Applicable
CSM is currently looking for a highly skilled Security Analyst / Engineer with experience inan international manufacturing enterprise environment. This candidate should have 3-5 years of security systems experience in the use of information security tools and techniques, spanning data centers, networks, end points, and mobile devices. As the threat intelligence lead, this position will vigilantly seek information on new or potential security threats, actively manage threat events, and lead the incident response, escalation, and forensics analysis.
The scope of this position includes:
Reporting to the IT Security Operations Manager, regular monitoring of all information security systems for cyber-attacks, intrusion attempts, and security breaches with a timely response to any violation or threats.
Lead security threat intelligence gathering on new or potential security threats, actively manage threat events, and lead the incident response, escalation, and forensics analysis.
The position will ensure the Company’s ability to detect, respond to, and protect IT Infrastructure from cyber-attacks, intrusion attempts, and security breaches. Penetration testing to identify vulnerabilities and recommend safeguards as preemptive measure is also part of the position’s responsibilities.
The position will work with our 3rd party support to monitor networks, computers, and applications, looking for events and traffic indicators that signal intrusion. The position also determines the damage caused by detected intrusions, identifies how an intrusion occurred, and recommends safeguards against similar intrusions.
Included in the above, the position is responsible for process documentation for all security systems, and for threat detection activities including remediation steps and escalation points. Position is also responsible for maintaining perimeter security system metrics and KPIs.
The position also requires an understanding of cybersecurity principles, trends and emerging technologies; an ability to identify risks associated with new technologies, and to decide on the appropriate controls to mitigate such risks.
The successful candidate will maintain a close working relationship with the Company IS leaders, and display a capability to distill complex security issues and events into oral or written communications. An ability to ensure accurate and timely alignment with business requirements, without introducing unmitigated security risks, is a key requirement.
Identify and manage security vulnerabilities, threats and events in network, host systems and applications
Act as a focal point for IT security investigations, direct responses, and recommend course of action
Develop strategies to handle security incidents and coordinate investigative activities
Develop standard processes and documentation for security incident tracking and management, in all locations
Work closely with the business groups as a consultant to understand and deliver secure and reliable solutions to business problems
Identification, selection and implementation of new Information Security and Cybersecurity capabilities.
Review and make recommendation on any exception request to established security standards
Review SaaS, PaaS, IaaS and outsource provider performance data to identify trends and issues and develop performance improvement plans in regards to Information Security
Provide input to the CyberSecurity Delivery Technology Roadmap
Assist in architecting and implementing managed service solutions
Lead future service delivery strategy development for information security with the latest technologies, intelligence, and potential threats
Understand and utilize change management, project management and incident management processes
Define, create, implement and continuously improve standards and processes based on industry best practice and subject matter expertise.
Define key metrics for I.T. Security that identifies risks and improvements.
Provide technical responses to internal and external audit functions and work on technical responses to audit actions.
Monitor and record compliance with operational security standards and procedures
Education, Experience and Skills Required
Bachelor’s Degree in Computer Science, Information Systems, or Engineering, or equivalent work experience with an information security focus.
3- 5 years experience in Information Security Forensics, malware identification, penetration testing, intrusion detection and strategic thinking on security issues.
Demonstrate experience as a technical security subject matter expert in at least one or more of the following areas:
Operating Systems security
“Cloud” Software as a Service
Hands-on experience and skill in the details of security threats, incident response, and security tools.
Possess strong skills to lead cross-functional teams (internal/client/vendor/onshore/offshore) and work collaboratively with all levels of technical and business teams.
Possess solid written and verbal communication skills, and polished presentation skills
Experience working with complex ERP software applications and integration projects
Security certifications including CISSP or Certified ethical hacker would be a plus
At least ITIL v3 certified
Working knowledge of modern security technologies such as firewalls, VPN,IDS/ IPS, SIEM, endpoint protection, web security gateways, NAC etc.
Solid knowledge /experience in Windows and IP intranet/Internet security environments including: firewalls, intrusion detection, incident response, policy writing, vulnerability testing, operating system hardening, regulatory compliance, and data classification
Fortinet firewalls, McAfee ENS, Cisco ISE, ForeScout, Wireshark protocol analyzer, MS Active Directory architecture, Office 365 Security, Zscaler,
CSM Bakery Solutions
Sandy Springs, GA, USA