Core Responsibilities
A day in the life of this role involves configuring, maintaining, and maturing Privileged Access Management (PAM) tools such as StrongDM and Delinea. You will work closely with technology and business teams for onboarding and maintenance of access. Expect high levels of interaction with the manager and the PAM team, including multiple stand-ups during the week and a team meeting once a week to discuss project status and work as needed.
The top priority for the first few weeks/months will be the configuration and migration of Delinea to a new platform, enabling additional technology and applications to use privileged access management, and developing AWS processes such as Just In Time Access and Database Access processes. The biggest challenge in this role will be aligning the work timelines with AWS Migration efforts.
Process and Project Management: Own the design and implementation of key IT projects and initiatives as they pertain to the organization's long-term security strategy. Identify areas for improvement where processes do not currently exist and drive the development and delivery of new processes to address these gaps. Manage ambiguity and deliver quality results with minimal supervision in coordinating projects and other deliverables. Willingness to escalate identified issues as necessary and the ability to identify when to partner with leadership to resolve issues, risks, or obstacles. Build consensus for delivering results while finding common ground for collaboration and partnership.
Documentation, Metrics, and Presentations: Understand the various tools and technologies commonly associated with Information Security. Lead the creation and maintenance of relevant documentation, including the ability to deliver run books, project updates, process documentation, architecture, and technical requirements and presentations. Develop and deliver Key Performance Indicators (KPIs) through an understanding of the tools and deliverables by helping to develop, maintain, and mature the associated reporting structure. Produce meaningful and actionable metrics through data analysis. Conduct data analysis exercises using Excel Pivot Tables, database queries, and other data-driven analysis tools. Produce presentations at various levels of abstraction dependent on the intended audience using Microsoft PowerPoint, Microsoft Visio, or equivalent tools.
Leadership and Development: Work in a team-fostered, fast-paced, multi-threaded environment. Serve as the subject matter expert in various technical Information Security disciplines and mentor junior staff. Demonstrate self-learning in gaining knowledge of new technical developments and ensure they are shared appropriately and applied within the department. Actively work as a change agent to support the InfoSec team's strategy and vision both within the InfoSec team and the broader organization. Identify and understand drivers for change and act as an individual champion or partner with leadership to deliver those changes. Effectively partner with peers within the department to include them in key projects, risks, or issues. Intermediate to expert interpersonal, negotiation, and oral communication skills are expected.
Human Relations: Maintain the highest level of confidentiality and professionalism. Proactively identify potential issues and deliver well-reasoned solutions. Diffuse problematic situations and manage through conflict resolution. Decompose complex topics and break them down into layman's terms or analogies that help drive clarity and understanding. Be seen as an enabling partner that provides alternative options or supporting information when saying no to business or IT requests. Be viewed by leadership and peers as credible, trustworthy, and respectful.
Working Conditions/Physical Requirements: Normal office environment, some travel may be required. As the needs of the business continue to evolve, this role may be asked to work an on-call rotation, including evenings or weekends.
Essential Qualifications, Skills, and Technologies
- Four or more years of experience in Information Security or Infrastructure.
- Intermediate to expert-level knowledge of IT tools and practices, including Networking, LDAP Directories, Vulnerability/Patch Management, Change Management, Incident Management, Server and Desktop Management, Mainframe Technologies, Encryption and Key Management, Cloud Architecture and Computing, Software Application General Computing Controls, Business Continuity/Disaster Recovery, Software Development Lifecycle, Access Management, and Cyber Security Tools (Security Incident Event Management (SIEM), Security Orchestration, Automation and Response (SOAR), Data Loss Prevention (DLP), Intrusion Detection System (IDS), Intrusion Prevention System (IPS), End User Behavioral Analytics (EUBA), Web Application Firewall (WAF), Network Access Control (NAC), Privileged Access Management (PAM), Endpoint Detection Response (EDR)).
- Broad range of skills with different technical platforms (firewalls, servers, workstations, networks, storage, security, Internet, and cloud (SaaS/IaaS/PaaS) technologies).
- Working understanding of NIST security standards, PCI-DSS, and SOX controls.
Preferred (Nice-to-Have) Skills or Experience
- Bachelor's or equivalent experience in Computer Science, Networking, or Information Technology.
- Certification: Security , Network , CISSP, SSCP, CCSP.
- Five or more years of experience in Information Security or Infrastructure experience.
- Privileged and Identity Access Management hands-on tech skills.
- AWS development knowledge.
- Scripting and automation.