Overview
Contract - W2
Contract - 18 Month(s)
Skills
Security
CISSP
Systems Engineer
CIAM
Application Firewall (WAF)
Network Access Control (NAC)
Privileged Access Management (PAM)
Endpoint Detection Response (EDR)
Job Details
Role: Systems Engineer
Duration: 18 Months Contract
Location: 100% Remote
Job Description:
What would "a day in the life" of this role look like? Configuring, maintaining, and maturing PAM tools such as StrongDM and Delinea. Working on with technology and business teams for onboarding and maintenance of access.
What interaction level with this role have the team members and hiring manager? Multiple stand ups during the week, team meeting once a week to go over project status, project work as needed. This would be high touch/interaction with manager and PAM team.
What would you say is the top priority for the worker over the first few weeks/months? Configuration and migration of Delinea to new platform, enabling additional technology and applications to use privileged access management, develop AWS
What would you say is the top priority for the worker over the first few weeks/months? Configuration and migration of Delinea to new platform, enabling additional technology and applications to use privileged access management, develop AWS
processes such as Just In Time Access and Database access processes
What do you foresee being the biggest challenge in this role? The timelines for which work is needing to be completed that should align with AWS Migration efforts
What do you foresee being the biggest challenge in this role? The timelines for which work is needing to be completed that should align with AWS Migration efforts
Required Skills
Top 3 Must-Haves (Hard and/or Soft Skills):
Top 3 Must-Haves (Hard and/or Soft Skills):
Top 3 Nice-To-Haves (Hard and/or Soft Skills) 1.Privileged and Identity Access Management hands-on tech skills
2. AWS development knowledge
3. scripting and automation
Top 3 Must-Haves (Hard and/or Soft Skills):
Top 3 Must-Haves (Hard and/or Soft Skills):
Top 3 Nice-To-Haves (Hard and/or Soft Skills) 1.Privileged and Identity Access Management hands-on tech skills
2. AWS development knowledge
3. scripting and automation
Top 3 Nice-To-Haves (Hard and/or Soft Skills)
Degree Requirements (Experience in Lieu of Degree): 1.Cyber Security Controls
2. Documentation
3. Project Management
Certification Requirements (Any Preferences): CISSP preference not required
CIAM preference not required
Security + - preference not required
Essential Job Functions
Process and Project Management - Own the design and the implementation of key IT projects and initiatives as they pertain to the
organization's long-term security strategy. Identify areas of improvement where processes do not currently exist and drive the development
and delivery of new processes to address these gaps. Ability to manage ambiguity and deliver quality results with minimal supervision in
coordinating projects and other deliverables. Willingness to escalate identified issues as necessary and the ability to identify when to partner
with leadership to resolve issues, risks or obstacles. Builds consensus for delivering results while finding common ground for collaboration
and partnership.
Documentation, Metrics and Presentations - Understand the various tools and technologies commonly associated with Information
Security. Lead the creation of and the maintenance of relevant documentation including the ability to deliver run books, project updates,
process documentation, architecture and technical requirements and presentations. Develop and deliver Key Performance Indicators (KPIs)
through the understanding of the tools and deliverables by helping to develop, maintain and mature the associated reporting structure. Ability
to produce meaningful and actionable metrics through data analysis. Conduct data analysis exercises using Excel Pivot Tables, database
queries, and other data driven analysis tools. Produces presentations at various levels of abstraction dependent on intended audience using
Microsoft Power Point, Microsoft Visio, or equivalent tools.
Leadership and Development: Ability to work in a team-fostered, fast-paced, multi-threaded environment. Serve as the subject matter expert
in various technical Information Security disciplines and mentoring junior staff. Demonstrate self-learning in gaining knowledge of new
technical developments and ensure they are shared appropriately and applied within the department. Comprehensive understanding of the
InfoSec team's strategy and vision and actively works as a change agent to support these initiatives both within the InfoSec team and the
broader organization. Identifies and understands drivers for change and will act as an individual champion or partner with leadership to
deliver those changes. Effectively partners with peers within the department to include them in key projects, risks or issues. Intermediate to
expert interpersonal, negotiation and oral communication skills expected.
Human Relations Ability to maintain the highest level of confidentiality and professionalism. Ability to proactively identify potential issues
and deliver well-reasoned solutions. Ability to diffuse problematic situations and manage through conflict resolution. Ability
to decompose complex topics and break them down into laymen's terms or analogies that help drive clarity and understanding. Viewed as
an enabling partner that provides alternative options or supporting information when saying no to business or IT requests. Seen by
leadership and peers as creditable, trustworthy and respectful.
Reports to: Manager, Information Security
Working Conditions/ Physical Requirements: Normal office environment, some travel may be required. As the need of the business continue
to evolve, this role may be asked to work an on-call rotation to include evenings or weekends.
Direct Reports: None
Degree Requirements (Experience in Lieu of Degree): 1.Cyber Security Controls
2. Documentation
3. Project Management
Certification Requirements (Any Preferences): CISSP preference not required
CIAM preference not required
Security + - preference not required
Essential Job Functions
Process and Project Management - Own the design and the implementation of key IT projects and initiatives as they pertain to the
organization's long-term security strategy. Identify areas of improvement where processes do not currently exist and drive the development
and delivery of new processes to address these gaps. Ability to manage ambiguity and deliver quality results with minimal supervision in
coordinating projects and other deliverables. Willingness to escalate identified issues as necessary and the ability to identify when to partner
with leadership to resolve issues, risks or obstacles. Builds consensus for delivering results while finding common ground for collaboration
and partnership.
Documentation, Metrics and Presentations - Understand the various tools and technologies commonly associated with Information
Security. Lead the creation of and the maintenance of relevant documentation including the ability to deliver run books, project updates,
process documentation, architecture and technical requirements and presentations. Develop and deliver Key Performance Indicators (KPIs)
through the understanding of the tools and deliverables by helping to develop, maintain and mature the associated reporting structure. Ability
to produce meaningful and actionable metrics through data analysis. Conduct data analysis exercises using Excel Pivot Tables, database
queries, and other data driven analysis tools. Produces presentations at various levels of abstraction dependent on intended audience using
Microsoft Power Point, Microsoft Visio, or equivalent tools.
Leadership and Development: Ability to work in a team-fostered, fast-paced, multi-threaded environment. Serve as the subject matter expert
in various technical Information Security disciplines and mentoring junior staff. Demonstrate self-learning in gaining knowledge of new
technical developments and ensure they are shared appropriately and applied within the department. Comprehensive understanding of the
InfoSec team's strategy and vision and actively works as a change agent to support these initiatives both within the InfoSec team and the
broader organization. Identifies and understands drivers for change and will act as an individual champion or partner with leadership to
deliver those changes. Effectively partners with peers within the department to include them in key projects, risks or issues. Intermediate to
expert interpersonal, negotiation and oral communication skills expected.
Human Relations Ability to maintain the highest level of confidentiality and professionalism. Ability to proactively identify potential issues
and deliver well-reasoned solutions. Ability to diffuse problematic situations and manage through conflict resolution. Ability
to decompose complex topics and break them down into laymen's terms or analogies that help drive clarity and understanding. Viewed as
an enabling partner that provides alternative options or supporting information when saying no to business or IT requests. Seen by
leadership and peers as creditable, trustworthy and respectful.
Reports to: Manager, Information Security
Working Conditions/ Physical Requirements: Normal office environment, some travel may be required. As the need of the business continue
to evolve, this role may be asked to work an on-call rotation to include evenings or weekends.
Direct Reports: None
Minimum Qualifications:
Four or more years experience in Information Security or Infrastructure. Intermediate to expert level knowledge of IT tools and practices
including, but not limited to: Networking, LDAP Directories, Vulnerability/Patch Management, Change Management, Incident Management,
Server and Desktop Management, Mainframe Technologies, Encryption and Key Management, Cloud Architecture and Computing, Software
Application General Computing Controls, Business Continuity/Disaster Recovery, Software Development Lifecycle, Access Management,
and Cyber Security Tools (Security Incident Event Management (SIEM), Security Orchestration, Automation and Response (SOAR), Data
Loss Prevention (DLP) , Intrusion Detection System (IDS), Intrusion Prevention System (IPS), End User Behavioral Analytics (EUBA), Web
Application Firewall (WAF), Network Access Control (NAC), Privileged Access Management (PAM), Endpoint Detection Response (EDR).
Broad range of skills with different technical platforms (firewalls, servers, workstations, networks, storage, security, Internet and cloud (SaaS
/ IaaS / PaaS) technologies). Working understanding of NIST security standards, PCI - DSS and SOX controls.
Preferred Experience:
Bachelor's or equivalent experience in Computer Science, Networking or Information Technology
Certification: Security +, Network+, CISSP, SSCP, CCSP
Five or more years experience in Information Security or Infrastructure experience
Four or more years experience in Information Security or Infrastructure. Intermediate to expert level knowledge of IT tools and practices
including, but not limited to: Networking, LDAP Directories, Vulnerability/Patch Management, Change Management, Incident Management,
Server and Desktop Management, Mainframe Technologies, Encryption and Key Management, Cloud Architecture and Computing, Software
Application General Computing Controls, Business Continuity/Disaster Recovery, Software Development Lifecycle, Access Management,
and Cyber Security Tools (Security Incident Event Management (SIEM), Security Orchestration, Automation and Response (SOAR), Data
Loss Prevention (DLP) , Intrusion Detection System (IDS), Intrusion Prevention System (IPS), End User Behavioral Analytics (EUBA), Web
Application Firewall (WAF), Network Access Control (NAC), Privileged Access Management (PAM), Endpoint Detection Response (EDR).
Broad range of skills with different technical platforms (firewalls, servers, workstations, networks, storage, security, Internet and cloud (SaaS
/ IaaS / PaaS) technologies). Working understanding of NIST security standards, PCI - DSS and SOX controls.
Preferred Experience:
Bachelor's or equivalent experience in Computer Science, Networking or Information Technology
Certification: Security +, Network+, CISSP, SSCP, CCSP
Five or more years experience in Information Security or Infrastructure experience
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.