Job description
Implements, maintains, and operates security hardware and software, including antivirus, endpoint protection, and XDR solutions. · Implements, maintains, and operates Identity Access Management (IAM) components, including single sign-on and multi-factor authentication. · Assists in developing Information Security policies and procedures. · Evaluates and recommends Information security tools and solutions. · Implements and monitors security controls and procedures. · Develops monitoring and visibility capabilities, reports on incidents, vulnerabilities, and trends. · Performs periodic security scans of organization's infrastructure to identify vulnerabilities. · Works with third-party security firms to perform annual assessment and remediation of vulnerabilities to the organization's Information Technology infrastructure. · Understands and implements the organization's Incident Response Plan. · Monitors network traffic flow to/from and within the organization using network analysis tools and firewall logs. · Writes comprehensive reports including incident response debriefs, software evaluation plans, and product evaluation reports. · Works and communicates effectively with the various professionals throughout the organization. · Conducts educational exercises for other team members and departments on a periodic basis. · Responds to Information Security incidents and alerts. · Develops and modifies basic scripts to assist in log ingestion, automation of routine tasks, and deployment of Information Security tools. · Serves as a point of escalation to Helpdesk and IT Operations on Information Security issues. · Follows the organization's change management process and ensures stakeholders are involved in changes. · Provides timely notification to Information Security Management of internal and business partner incidents.