Atlanta, GA, USA
2 days ago
IT - Technology Lead | Identity Management | IDAM-Design , work flow , Implementation
Job Seekers, Please send resumes to resumes@hireitpeople.com

Detailed Job Description:

Participate in efforts related to designing, planning, enhancing and testing all information security technologies used throughout the enterprise, including base-lining current systems, trend analysis and capacity planning, as required for future systems requirements. Participate in technical assessment, research and testing of new technologies, as requested, using information security design, automation, and scripting best practices and procedures. Participate in the analysis of information to determine, recommend and plan the use of new technologies, or modifications to existing equipment and systems that will provide capability for proposed project or work load, efficient operation and effective use of allotted resources. Participate in the implementation of new information security technologies or integration of existing technologies, including initial configuration, installation, change management and operational handoff. Provide Tier III technical support of information security technologies, providing problem analysis and resolution in a timely manner. Participate in all areas of information security technology management, systems development, systems implementation and systems support, as assigned. Support training of less experienced personnel. Using manual and automated processes, ensure adherence of all responsible information security technologies to established design and configuration standards.  Establish and execute processes to monitor and report on information security technology infrastructure compliance to policies, standards and best practices. Execute system tuning and make recommendations for improvements. Monitor information security systems using enterprise class monitoring systems, proactively identify potential issues and exercise appropriate responses to events ensuring availability of the environment. Generate and communicate appropriate reporting to illustrate operational status and stability of the information security technology infrastructure.

Required Skills and Competencies:

Bachelor s degree in Computer Science or relevant field, or equivalent education and related training Ten years of experience in Information Security and expert level experience in Authentication Certified Information Systems Security Professional (CISSP) certification Extensive understanding of applied enterprise information security technologies including, but not limited to, firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering and mainframe security Thorough knowledge of data flow, mainframe/client server systems, problem analysis and systems tuning; adept with network interfaces and technologies Knowledge of one or more programming/script languages with proficiency in development of systems and process automation Good verbal and written communication skills

Desired Skills:

Knowledge of financial services industry and all applicable regulations and industry standards Other security certifications (e.g. Cisco Certified Network Associate (CCNA) Security, GIAC (Global Information Assurance Certification) Security Essentials Certification (GSEC), GIAC Certified Enterprise Defender (GCED), Certified Perimeter Protection Analyst (GPPA)) Other technical certifications (e.g. CCNA, Red Hat Certified Engineer (RHCE), Microsoft Certified Systems Engineer (MCSE))

Minimum years of experience*: 10

Confirm your E-mail: Send Email