QUALIFICATIONS Minimum 4-7 years in developing security requirements, policies development, supporting network security, some pen testingscanning, developing some scripts to automate implementation of security requirements, and familiar with new technologies such as Docker, NoSQL, big data, Mobile application security, etc. Strong knowledge and experience with Windows Server, UnixLinux sys ems, database servers, Sun Storage Array, firewalls, Virtualization, SQL Databases,. Bachelorrsquos Degree in Computer Science (or related field) or equivalent Strong knowledge and experience in Identity and access management technologies. Flexible, adaptable, and able to manage multiple tasks in a dynamic, fast-paced environment. Ability to communicate complex technical concepts clearly. Prefer CCNA, CCSE, GIAC or CISSP certifications Candidate must have strong configuration, system and network hardening, risk assessment with Linux, Windows servers, Middleware, network appliances etc. The candidate must have an in-depth knowledge of Information Security regulations, industry requirements and generally accepted best practices such as FFIEC, GLBA , PCI DSS, ISO, NIST Possess strong analytical reasoning skills with the ability recognize and evaluate facts, objectively analyze situations, synthesize and organize datainformation from multiple sources, detail oriented, and show strong judgment Excellent written and verbal communication skills, interpersonal and presentation skills and the proven ability to influence and communicate effectively. Ability to convey security concepts to both technical and non-technical audiences
* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.