Electricenergyonline
Cyber Security Analyst CyberArk Public Service Enterprise Group Location: New Je
Electricenergyonline, Newark, New Jersey, us, 07175
Requisition : 78509
Job Summary
This position is an experienced, senior level, hands-on technical lead, performing privileged access management (PAM) security functions and maintaining PAM systems, while providing technical guidance to the team. Manages PAM technologies, as well as PAM security policies and procedures, and incident response as needed. Provides technical expertise and support to IT management and staff in cybersecurity threat risk assessments, development, testing, and the implementation and operation of appropriate information security plans, procedures, and control techniques designed to prevent, minimize, or quickly recover from cyber-attacks or other serious events.
Job Responsibilities
Leads and manages PAM technologies
Provides technical expertise in threat/risk assessments related to privileged access
Defines, designs, and implements strategies to protect against emerging threats using PAM tools
Responds to security incidents as needed
Performs security reviews on new PAM technologies and changes to existing technologies
Manages information privileged access management technologies
Job Specific Qualifications
Required:
Bachelor's degree in Computer Science, Information Systems, Cyber Security, Math, or Engineering and a minimum of 4 years of experience in Information Security; In lieu of a degree, 8 years of experience in Information Security.
Experience providing technical PAM expertise to IT management and staff in cybersecurity threat risk assessments, development, testing, and the implementation and operation of appropriate information security plans, procedures, and control techniques designed to prevent, minimize, or quickly recover from cyber-attacks or other serious events.
Must have strong Identity and Access Management (IAM) and PAM experience.
Must be proficient in defining processes and procedures for PAM.
Ability to follow cybersecurity news and alerts, understand complex attack vectors and risks, and identify and evaluate emergent cybersecurity threats and vulnerabilities.
Demonstrated ability to recommend appropriate corrective actions for information security incidents and provide risk mitigation recommendations to management and team.
Experience with designing process flows to be implemented in security automation tools to automatically respond to threats quickly and effectively.
Experience with reviewing complex IAM architecture design diagrams and documents for new technologies and changes to existing technologies to determine risks and provide recommendations and mitigations.
Must be able to work independently with little or no supervision.
Must demonstrate strong verbal and written communication skills.
Must demonstrate strong leadership, technical teamwork, and interpersonal skills.
Ability and willingness to work in a strong team environment, constantly teaching and learning from other team members.
Ability to foster working relationships with the team, IT Management, and Client departments.
Ability to explain technical concepts to business users in the context of business requirements.
Must demonstrate technical experience including: information/data/network/computer security design, administration, and/or assessment.
Must demonstrate broad knowledge of information systems including Windows security, network security, systems development, communication networks, security software/hardware, and operating systems.
Experience with key information security technologies such as SIEM, firewalls, intrusion detection/prevention systems, vulnerability assessment, encryption, identity and access control systems, anti-malware, and security event analysis.
Must demonstrate strong organizational, managerial, and financial management skills.
Must demonstrate the ability to communicate effectively with both technical and non-technical individuals. Must have strong planning skills and be results-oriented.
Must demonstrate a solid working knowledge of Information Security principles and practices.
Desired:
ISC2 Certified Information Systems Security Professional (CISSP) or equivalent
Programming Experience in Python
NOTE:Approximately 5% Travel requiredPlease note if NERC CIP position, requires NERC CIP background investigation prior to start
Minimum Years of Experience : 4 years of experience
Education : Bachelor's
Certifications : None Noted
Read the full posting.
#J-18808-Ljbffr
Job Summary
This position is an experienced, senior level, hands-on technical lead, performing privileged access management (PAM) security functions and maintaining PAM systems, while providing technical guidance to the team. Manages PAM technologies, as well as PAM security policies and procedures, and incident response as needed. Provides technical expertise and support to IT management and staff in cybersecurity threat risk assessments, development, testing, and the implementation and operation of appropriate information security plans, procedures, and control techniques designed to prevent, minimize, or quickly recover from cyber-attacks or other serious events.
Job Responsibilities
Leads and manages PAM technologies
Provides technical expertise in threat/risk assessments related to privileged access
Defines, designs, and implements strategies to protect against emerging threats using PAM tools
Responds to security incidents as needed
Performs security reviews on new PAM technologies and changes to existing technologies
Manages information privileged access management technologies
Job Specific Qualifications
Required:
Bachelor's degree in Computer Science, Information Systems, Cyber Security, Math, or Engineering and a minimum of 4 years of experience in Information Security; In lieu of a degree, 8 years of experience in Information Security.
Experience providing technical PAM expertise to IT management and staff in cybersecurity threat risk assessments, development, testing, and the implementation and operation of appropriate information security plans, procedures, and control techniques designed to prevent, minimize, or quickly recover from cyber-attacks or other serious events.
Must have strong Identity and Access Management (IAM) and PAM experience.
Must be proficient in defining processes and procedures for PAM.
Ability to follow cybersecurity news and alerts, understand complex attack vectors and risks, and identify and evaluate emergent cybersecurity threats and vulnerabilities.
Demonstrated ability to recommend appropriate corrective actions for information security incidents and provide risk mitigation recommendations to management and team.
Experience with designing process flows to be implemented in security automation tools to automatically respond to threats quickly and effectively.
Experience with reviewing complex IAM architecture design diagrams and documents for new technologies and changes to existing technologies to determine risks and provide recommendations and mitigations.
Must be able to work independently with little or no supervision.
Must demonstrate strong verbal and written communication skills.
Must demonstrate strong leadership, technical teamwork, and interpersonal skills.
Ability and willingness to work in a strong team environment, constantly teaching and learning from other team members.
Ability to foster working relationships with the team, IT Management, and Client departments.
Ability to explain technical concepts to business users in the context of business requirements.
Must demonstrate technical experience including: information/data/network/computer security design, administration, and/or assessment.
Must demonstrate broad knowledge of information systems including Windows security, network security, systems development, communication networks, security software/hardware, and operating systems.
Experience with key information security technologies such as SIEM, firewalls, intrusion detection/prevention systems, vulnerability assessment, encryption, identity and access control systems, anti-malware, and security event analysis.
Must demonstrate strong organizational, managerial, and financial management skills.
Must demonstrate the ability to communicate effectively with both technical and non-technical individuals. Must have strong planning skills and be results-oriented.
Must demonstrate a solid working knowledge of Information Security principles and practices.
Desired:
ISC2 Certified Information Systems Security Professional (CISSP) or equivalent
Programming Experience in Python
NOTE:Approximately 5% Travel requiredPlease note if NERC CIP position, requires NERC CIP background investigation prior to start
Minimum Years of Experience : 4 years of experience
Education : Bachelor's
Certifications : None Noted
Read the full posting.
#J-18808-Ljbffr