Estimated Length 12 Months Work hours37.50 Requirements The purpose of this position is to support the research, implementation, and ongoing operation and maintenance of all information security technologies that are designed to protect the corporate infrastructure at the host, endpoint, cloud, application levels. This position is responsible for ensuring that sensitive data is identified, and that it is properly protected through the use of the appropriate security technologies. The following desired knowledge, skills, and abilities are required for this position. Solid knowledge of the theory, concepts, and practice of computer networks and security technologies sufficient enough to learn a new product (with no formal training) well enough to provide technical support to its users, and to coordinate implementation with other technical professionals. Thorough knowledge microcomputer and data communication hardware telecommunication concepts, topologies and protocols local and wide area networking. Ability to keep abreast of the technical solutions available in the marketplace and ability to recognize their applicability at Client. Must be able to recognize when a process requires additional controls and then implement appropriate procedural changes. Excellent problem-solving, analytical, planning, and project management skills. Ability to communicate in oral and written form to users at all levels of the company particularly requires the ability to convey technical information to a non-technical audience. Long and short-term planning skills, including basic financial analysis tools such as cost benefit analysis. bull Participate in the development of, manage and maintain an Client Data Classification process where sensitive data that is housed within Client applications can be identified and cataloged. Research and make recommendations for further protecting sensitive data andor provide additional security technologies to serve this purpose. bull Ensure that Secure Application Coding techniques are followed during application development phases through integration of these requirements into the SDLC. Assist with the process of performing application code reviews, Application security assessment techniques (SAST, DAST), system vulnerability assessments, and penetration testing to test the strength of the Client computing environment. bull Have application security vulnerability knowledge including security risks as per OWASP, SANS Top 25, etc. bull Web Servers experience (IIS, Apache, etc.) and middleware software experience Oracle's WebLogic and IBM's WebSphere. bull Knowledge of programming languages Java, C.NET, PHP, etc. and web application multi-tier architectures and operation (session management, caching, etc.) bull Assist with the process of maintaining and administering the ProxyContent Filtering technologies at the Client and ensure that any remediation that is required to protect against threats are handled in a timely manner. bull Administer the Cryptography Key Management (PKI) processes across the Client computing environment. bull Assist with the Server and Network Hardening processes performed by the infrastructure teams and perform Hardening Validation testing to ensure that policies and guidelines are being adhered to. bull Research and recommend the appropriate levels of infrastructure and application security required for the Cloud, Virtualized, Middleware, and Database environments, and manage the administration of security on these platforms to ensure that adequate controls are in place. bull Assist with the process of implementing and maintaining current and supported levels of Anti-Malware and Anti-Spam technologies to protect the Client computing environment. bull Assist with the implementation and administration of Data Loss Prevention technologies including but not limited to Full Disk Encryption, Removable Media Encryption, and port protection technologies. bull Perform the implementation of the technical security for Mobile Device Management and control access to the Air Watch Administration platform to ensure that adequate controls are always in place. bull Strong experience working in DevSecOps and Security Automation. bull Experience with automation of security testing as part of a CICD pipeline. bull The successful candidate will be working across multiple teams to enhance application security, and improve security integration and automation bull Experience with common cloud services, recommended security best practices and secure deployment patterns. bull Understanding of core cryptography concepts (Encryption, Hashing, HMAC, digital signatures) and how they are applied and attacked in web applications (e.g. TLS attacks, CBC attacks). bull Ability to analyze protocols (such as OAuth, SAML, etc), flows and interactions in a system design to evaluate gaps. bull Ability to identify threats, vulnerabilities and gaps in the design and environments (i.e Cloud) before it is implemented. bull Good written and oral communication to be able to articulate risks to both technical and management stakeholders. bull Perform tasks with little supervisions and able to deliver timely and quality deliverables. Additional Skills and Information Communication Skills, Analyzing and synthesizing technical reports.