Overview
Skills
Job Details
Role Description:
Cyber Security Engineer will be responsible for planning, development, and implementation of enterprise information security solutions (such as authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address current and emerging security needs of the business.
The role will require the solution of complex enterprise-scale information security problems. The person in this role will design and develop new technologies and architectures and security products that will support security requirements for the enterprise and its customers, business partners and vendors.
The person in this role will contribute to the execution of strategic information security architecture and enable effective business operations, manage enterprise risk and address business regulatory issues.
Responsibilities:
Create and updates a view of IT assets, related attack surfaces, and threat actors to illustrate the flow of data and associated security threats.
Researches designs and develops new enterprise technologies, architecture and security products that will support security requirements.
Severs as security expert in one or more application development, database design, network and platform (operating system) efforts, helping project teams comply with enterprise and Its security policies, industry regulations and best practice.
Analyzes business impact and exposure based on emerging security threats, vulnerabilities, and risk and contributes to the development and maintenance of information security architecture.
Serve as expert in one or more platform, application, storage, network, virtualization and cloud mobile security best practices.
Requirements:
7+ years of experience in a cybersecurity role.
Insurance experience preferred.
Bachelor's degree in a related field, such as computer science or information technology.
Experience evaluating new applications and technologies against their security requirements and framework, and working with the application owners to remediate security gaps.