U.S. Xpress, Inc
What You’ll Do:
This position will lead efforts to safeguard U.S. Xpress computer networks and systems; Plan and execute security measures to monitor and protect sensitive data and systems from infiltration and cyber-attacks; Manage and coordinate resolution of incidents end to end as well as maintain the Disaster Recovery Plan.
Recommend and direct the implementation of advanced defense security strategies and solutions as it relates to cybersecurity, identity management, access control, application security, and threat and vulnerability management.
Plan and carry out security measures to monitor and protect sensitive data and systems from infiltration and cyber-attacks.
Develop and maintain policies and procedures which are designed to protect computer programs, data bases and data files from unauthorized or accidental duplication, modification or destruction.
Manage Incidents to end; includes receiving, logging, classifying, troubleshooting, assigning, tracking and reporting all Incidents. Leverage critical thinking skills to drive cross-functional teams to resolution as soon as possible.
Create and maintain Incident process documentation.
Lead projects to mature/evolve the Incident process.
Maintain the IT department’s Disaster Recovery Plan and Systems Run book; includes testing plans to detect faults and minimize malfunctions.
Provide architectural analysis of cyber security features and relate existing system to future needs and trends; Establish security strategies to address new technologies being developed and deployed.
Consult on appropriate application security requirements and controls, and provide practical guidance on meeting these requirements and controls.
Consult on application security testing tools and services, with capabilities to guide and/or execute on application testing assignments.
Assess reported security threats and weaknesses, across all security layers; Identify application security gaps and develop mitigation strategies based on risk and cost efficiency.
Monitor for inappropriate utilization of computer resources.
Develop strong partnerships with business clients, application developers, software vendors, and other technical resources.
Provide subject matter expertise on projects and program development as assigned, performing and contributing to all aspects of project.
Perform security tools maintenance as required.
Participates in 24/7 on-call rotation.
Other duties as assigned.