PLEASE NOTE:
THIS IS AN ONSITE POSITION SOME REMOTE WORK COULD BE ALLOWED.
THIS IS A W2 CONTRACT, NO 1099 OR CORP-TO-CORP CAN BE SUBMITTED.
NO 3RD PARTY RECRUITED SUBMITTALS PLEASE.
Position Scope:
Serves as the technical lead, with responsibility for coordinating the planning and implementation of operations, life cycle management and maintenance of IT End Point Protection Systems (EPPS) and IT Advanced Threat Protection Systems (ATPS – e.g. End-Point / Threat Protection Platform and underlying related Infrastructure, such as Microsoft Defender ATP) to protect the Computer hardware such as personal computers, output management, and other IT End User devices (Laptops, Desktops, Apple computer, Mobile Devices). Runs complex operational/technical projects and ensures long-term requirements of Advanced Threat Protection Systems and lifecycle planning. Serves as main point of contact for Workspace EPPS/ATPS Operation topics for all Business Group business units Globally.
Position Responsibilities:
Leads the planning, implementation, operations and maintenance of End Point Protection Systems (EPPS) and Advanced Threat Protection Systems (ATPS) that perform to defined IT-Security expectations.
Supervises the design, test, and implementation of EPP and ATP systems, including security monitoring in relation to End-Devices.
Manages and improves IT EPP and ATP systems, incident response, digital forensics and loss prevention.
Orchestrates and aligns teams to perform risk and vulnerability assessment at the network, system and application level in own area of responsibility.
Reviews the results of threat modeling exercises and interprets results to management leadership as necessary.
Directs the development and implementation of security controls and formulation of operational risk mitigations.
Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access.
Creates, reviews and presents security reports in own area of responsibility.
Establishes strict program control processes to ensure mitigation of risks.
Recommends additional security requirements and safeguards.
Supports the security test and evaluation through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports.
Conducts reviews of each system’s audits and monitors corrective actions until all actions are closed.
Ensures equipment availability (planning, lifecycle upgrades) by steering operational processes surrounding IT End Device Protection as well as IT-Security Incident Handling processes.
Works closely within the global network of Workspace Systems as well as various IT-Security organisations within the IT Group, and ensures that standards, operations, processes and procedures are aligned and follows the directions of the function “Workspace Solutions”. Ensures overall adherence to the Group’s Strategy /Security.
Oversees the worldwide rollout and configuration of the client side of the Workspace ATP Solution in alignment with global and local End-Device responsible and operations managers.
Acts as escalation instance for Feature Team Members towards the Feature Team Lead.
Requires knowledge of various business processes for multiple business units in addition to detailed knowledge of all ITIL processes used.
Organizes the physical access management for providers in relevant IT applications.
Provides event, access, incident and problem management as well service request fulfillment for non-standard solutions.
Utilizes technical and process skills to ensure delivery and complete customer satisfaction.
Runs complex projects ensuring they are completed on time and within budget with only general direction from management.
Monitors reports to ensure (Service Level Agreements) SLAs are met and all processes are followed as necessary.
Participates in IT projects.
Recommends and facilitates quality improvement efforts. Maintains current knowledge of future innovations, technical trends and applies this to direct future changes. Aligns knowledge of the solutions available to best practices for the business processes.
Develops project plans, administers the change control process and ensures that tasks are completed on time and within budget.
Performs other duties as assigned by Operations Supervisor.
Position Competencies:
Education:
BS in Computer Science or Cyber Security (preferred) or the equivalent of 4 years of related experience in IT Security. MS preferred.
Experience:
5+ years of experience in IT-Security, ideally in the area of End-Point-Protection
5+ years of experience of information system concepts and technologies.
5+ years of experience in inventory management skills (both logistical and financial) to manage the lifecycle for Workspace Devices.
5+ years of experience demonstrating strong communication and organizational skills to interface with associated vendors, interfaces, and processes.
5+ years of experience in Windows Registry Administration
5+ years of experience in vendor management
3+ years of experience demonstrating project management skills
3+ years in end-point-protection and threat protection
3+ years of experience interfacing with the business to meet requirements and targets.
3+ years of experience of administrational tool development and maintenance
3+ years knowledge of complex IT systems and stay up to date with the latest security standards, systems and authentication protocols, as well as best practice security products.
3+ years knowledge of (Security) Incident Management and Response
3+ years knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, 3+ years years of knowledge of database systems from a workplace operations perspective .
3+ years knowledge in security device management
3+ years knowledge of ITIL based problem, incident and change management
3+ years knowledge of ITIL and IT-Service-Management
3+ years knowledge of threat management and threat intelligence
3+ years knowledge of Infrastructure Security and its impact on Security Operations, Vulnerabilities, Reporting, Analytics and Monitoring.
3+ years knowledge of various operating system including Windows, Linux, Unix
3+ years knowledge of applications, databases, middleware to address security threats against the same
3+ years of analytical skills, problem solving and interpersonal skills
3+ years of ability to think like a hacker, to anticipate moves and tactics that hackers will use to try and gain unauthorized access to the companies computer system.
3+ years of expereince in preparation and presenting of reports, dashboards and documentation
3+ years of ability to handle high pressure situations with key stakeholders
Willingness to provide on call support for critical production issues
Job Types: Full-time, Contract
Pay: $41.00 – $50.00 per hour
Schedule:
Ability to commute/relocate:
Experience:
Work Location: One location
br{display:none;}.css-58vpdc ul > li{margin-left:0;}.css-58vpdc li{padding:0;}]]> Cook Technology Corp. Cook Technology Corp is the largest and highest earning group of IT...
Apply For This JobJob Description Join a Legacy of Innovation 110 Years and Counting! Daiichi Sankyo Group is dedicated to the creation and...
Apply For This JobJob DescriptionBringing life-changing medicines to millions of people, Novartis sits at the intersection of cutting-edge medical science and innovative digital...
Apply For This Jobbr{display:none;}.css-58vpdc ul > li{margin-left:0;}.css-58vpdc li{padding:0;}]]> POSITION SUMMARY The Information Technology Support Technician supports the effective, efficient, and secure operations of...
Apply For This Jobbr{display:none;}.css-58vpdc ul > li{margin-left:0;}.css-58vpdc li{padding:0;}]]> Do you have IT experience or certifications? Are you great with communication and assisting other...
Apply For This Jobbr{display:none;}.css-58vpdc ul > li{margin-left:0;}.css-58vpdc li{padding:0;}]]> Job Description: Telos is seeking IT Planners to join our team at a multitude of...
Apply For This Job