Systems security specialist Internet & Ecommerce - Milwaukee, WI at Geebo

Systems security specialist

Company Name:
The Judge Group
Job ID: 415910
Job Title: SYSTEMS SECURITY SPECIALIST
Job Type: Contract
Company: JUDGE GROUP
Location: Milwaukee, WI
Contact E-mail:
Salary: Flexible
Description:
Systems Security Specialist, Senior
Designs, implements, and firmly controls multiple highlyadvanced technical security solutions and processes
simultaneously for the protection of enterprise informationassets. Determines standards for implementation and
configuration of software, hardware and system as a resource for problem determination for physical
network problem resolution in terms of access, securitybreaches, as well as abuse and policy changes.
Establishes sound security controls for the informationtechnology enterprise that meet the needs of enterprise
requirements and are cost effective, while adhering tostandards of reliability, availability and serviceability. Monitors,
investigates, documents and resolves identified securityweaknesses, and recommends documented solutions for
improvement.
Applies current security technologies to the design andintegration of enterprise application infrastructures to maintain
overall security. Works with commercial security productsand vendors in the design and application of state-of-the-art
secure networks.
Investigates complex network software problems and securitythreats. Recommends, plans and implements solutions to
protect the corporate infrastructure from outside threats,and collaborates with vendors, consultants and/or appropriate in-house staff todesign solutions.
Creates, establishes, and reviews information securityguidelines pertaining to the protection of data. Maintains
necessary documentation to support security strategy byoutlining the requirements and benefits of specific security tools
and/or solutions. Maintains and updates securitydocumentation including diagrams, sec. Provides expertise, guidance,recommendations and documented security configurations for implementation ofsecurity
tools and processes. Designs, develops, deploys, monitors,maintains, and controls the suite of tools used by the
Information Security team to protect Enterprise assets.
Collaborates with network and security technical staff toresolve security issues related to implementation of network and
product security.
Efficiently manages multiple simultaneous tasks across newprojects and existing systems. Provides timely reports on
project and task progress, and centrally tracks incoming andexisting problems.
Uses penetration and vulnerability analysis of variousproducts and applications, and provides reports to include deep
technical analysis and high-level non-technical overview.
Adheres to system, division and department policies,procedures, guidelines and standards.
Participates in and interprets security audits performed bythird party security vendors. Implements stop gap measures
defined from audit results, security standards, and disaster
recovery manuals. Researches, recommends and justifiesvarious security hardware and software purchases. Provides input into and
participates in determining hardware, software andadministrative standards and procedures.
Requires 5 years of experience in information technologysecurity and data privacy issues in a large complex information
technology environment with significant regulatoryrequirements.
Knowledge, Skills and Abilities Required
Demonstrated leadership skills and abilities.
Knowledge, expertise, and experience in network,infrastructure security verticals, endpoint protection verticals and in
advanced enterprise security systems.
Advanced software development skills with expertise andexperience in programming/scripting languages.
Knowledge of healthcare information technology securitypractices, procedures and applicable regulatory requirements.
Effective team player with ability to function in bothleadership and supportive roles, with ability to recognize the need to
balance security and data privacy issues with the need forsystem stability and performance while controlling overall cost.
Ability to interface with technical staff and otherinternal/external groups for assisting with existing security issues and
new security opportunities arising as a result oftechnological advances in security and proven ability to independently manage asecurity project and to develop solution proposals. Ability to collaborate with
the appropriate groups to isolate and solve problems and ensureproper coordination in all areas of project
implementation.
Strong knowledge of security best practices and informationtechnology security research skills.
Excellent problem-solving, critical thinking, anddecision-making ability. Ability to exercise judgment with creativity in
analyzing and solving unusual problems or situations thatarise.
Excellent verbal and written communication skills. Abilityto communicate and collaborate effectively with all levels of
employees, management, executives, and other organizationsand to address difficult and controversial issues.
Highly motivated self-starter with ability to workindependently, taking initiative to identify and address key opportunities
and issues.
Proficiency using Microsoft Office (Word, Excel, Access, andPowerPoint), or similar products.
Ability to work on multiple tasks concurrently, managespriorities, and complete assignments in a timely manner and
meet productivity standards. Ability to work within afast-paced, challenging environment, newly adapted security best
practices.Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.