20 feb
CompuCom Systems
Xico
Why CompuCom?
(Overview):
You will assist in the management of enterprise security architecture as well as provide technical support and advice on a wide variety of information security responsibilities, issues and problems.
This includes Security Incident Response, Vulnerability Management, Network and Application Vulnerability Scans, Leading/Performing Forensic Investigations, Compliance, Documentation, User Awareness and being a Subject Matter Expert in these and other areas related to Information Security.
Lead and/or work with internal, external and client teams to assist with the improvement of security of information systems, processes and procedures as well as to ensure compliance with all established policies,
standards and regulations relevant to CompuCom and our clients.
What We Need & What You'll Do (Responsibilities):
- Work with customers to gain a good understanding of an organizations IT Security, technology and Information Systems
- Lead and/or participate in security incident response activities as directed and as outlined in Security Incident Response Policy and Procedure;
- Monitor for, analyze, determine applicability, and take action for security events that are reported via a variety of sources, including a SIEM, IDS/IPS and AntiMalware servers;
- Review and update the incident response documentation, process and procedures to ensure continuous improvement
- Monitor, analyze, determine applicability, and assess risk for reported vulnerabilities to minimize risk;
- Participate in the Security Vulnerability Management process, offering advice and recommendations in order to ensure risk from vulnerabilities is kept to a minimum.
- Ensure that approved scanning tools have at least the minimum level of access needed to identify vulnerabilities that may exist for the device environment;
- Ensure that approved scanning tools are configured to perform all necessary tests in order to have a complete and accurate risk profile for all production systems and devices;
- Generate and publish reports of vulnerabilities; using these reports, assess level of compliance with the Security Vulnerability Management process;
- Perform threat hunting activities to proactively detect and isolate advanced threats that evade existing security solution
- The Forensic Expert may need to aid and assist Legal team and other investigators in understanding the implications of their findings regarding the collected evidence
- Working with team members and business unit representatives, develop and publish information security policies,
processes and procedures that support compliance with industry standards and regulations.
- Update existing information security policies, processes and procedures to ensure the policies remain current with industry standards and regulations;
- Review security related documentation produced by other teams for accuracy and completeness; where appropriate, assist with identifying the security requirements.
- Working with other team members and business unit representatives, develop user awareness programs and initiatives as it relates to Information Security.
Where needed, provide specialized security training or assist in identifying and assessing sources of training outside of CompuCom;
- Develop innovative ways to communicate Information Security standards and best practices to end users and business leaders.
- Keep abreast of security, compliance and privacy standards,
laws and regulations that are relevant to CompuCom operations;
- Develop proposals on how new and existing standards and technologies could be used to reduce risk to CompuCom and/or improve the competitive position of CompuCom;
- Communicate Information Security knowledge to internal as well as external parties.
- Participate in the Change Management process and weekly meetings;
- Active participation in Project Management;
- Mentoring less experienced team members;
Who You Are (Qualifications):
- CISSP Certification preferred
- PCI QSA Certification preferred
- GIAC Certified Forensic Examiner (GCFE)
- GIAC Certified Forensic Analyst (GCFA) - Good understanding of NIST 800-53, FISMA and ITAR
- Proficient in Linux, NIX, and Windows or have the ability to learn quickly
- Proficient in SIEM logging, malware/antivirus,
and other security tools
- Proficient in reverse engineering the forensic evidence that you discover in order to find the root causes of any successful attacks and penetrations into the affected organizations IT and Data Security system
- Experience performing forensic investigations using EnCase or similar tool
Muestra tus habilidades a la empresa, rellenar el formulario y deja un toque personal en la carta, ayudará el reclutador en la elección del candidato.