IT Security Engineer

Recruiter
Trimble Solutions Ltd
Location
Bristol (City Centre)
Posted
10 Feb 2018
Closes
15 Feb 2018
Contract Type
Permanent
Hours
Full Time
IT Security Analyst

Trimble is an exciting, entrepreneurial company, with a history of exceptional growth coupled with a disciplined and strategic focus on being the best. While GPS is at our core, we have grown beyond this technology to embrace other sophisticated positioning technologies and, in doing so; we are changing the way the world works. Our solutions are used in over 140 countries and we have incredibly diverse lines of business.

Our employees represent this diversity and can be found in over 30 countries, working closely with their colleagues around the world. Due to our geographic, product and customer reach, there is plenty of room at Trimble for exceptional people to grow. Come position yourself with an innovative industry leader and position yourself for success.

Job Summary

The Security Analyst is responsible for coordination of information security initiatives across the global organization to ensure that the confidentiality, integrity, and availability of the Real Estate & Workplace Solutions (RE&WS) division and customer information within the scope of the ISO 27001 Information Security Management System. The Security Analyst assists with implementation, and monitoring of enterprise security solutions. The Security Analyst works closely with Hosting, Software Development, other departments and vendors to evaluate and select security technologies that meet the security and compliance requirements of the business and serves as a high level technical security resources on network, systems and applications issues.

Key Responsibilities:

Assist with management and maintenance of security to ISO 27001 standards.

Monitor reports of computer systems (servers, firewalls, routers, applications, etc.) to determine unauthorized access or changes.

Coordinate, and implement security projects and measures for information systems to regulate access to computer data files, servers, computing systems and prevent unauthorized modification, destruction, or disclosure of information.

Work with the Hosting, and Development teams to deploy, operate and manage security tools such as: Intrusion prevention systems, Vulnerability assessment and penetration tools, Anti-malware, Security event management devices, and vulnerability management appliances.

Analyze security events/incidents, identify root cause and determine appropriate steps for incident response

Escalate security incidents and problems as required and monitor progress towards resolution until the incident/problem is closed/resolved

Ensure that information security assets are maintained, inventoried and/or disposed appropriately

Collaborate with IT teams to define and establish secure configuration standards for core infrastructure

Draft configuration manuals, operating procedures, reports, and system hardening guidelines

Monitor use of data files and regulate access to safeguard information in computer files.

Document computer security and emergency measures policies, procedures, and tests.

Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.

Confer with users to discuss issues such as computer data access needs, security violations, and programming changes. Advise on the education of individual information security responsibilities and accountability so that necessary information security activities are performed as needed, according to pre-established policies and standards.

Perform periodic risk assessments and audits that identify current and future security vulnerabilities. Recommend remediation plans and solutions to management.

Establish and maintain strong working relationships with the various other business units (and parent organizations) involved with information security matters (Legal, Internal Audit, Human Resources, etc.)

Initiate and manage special projects related to information security that may be needed to appropriately respond to ad-hoc or unexpected information security events.

Configure and maintain informational/identity access management, host and intrusion detection tools.

Perform system administration tasks relating to account provisioning (on-boarding and off-boarding, suspension, etc.)

Represent the organization or business division to conduct, support and coordinate internal and external audits; support the remediation of non-conformities.

Promote awareness of security issues with a focus on platform security.

Perform other duties as required.

Requirements:

Bachelor’s degree in IT/MIS/CS, or equivalent with 3 years of experience within Information Security

Experience in information security planning & operations. Experience in planning, designing, establishing and managing a security program for the enterprise.

Experience operating the ISO 27001 standard.

Familiarity with NIST 800-53, FISMA, FIPS, Privacy Shield, EU GDPR frameworks and regulations.

One or more active information security certifications such as Systems Security Certified Practitioner (SSCP), Certified Information Systems Security Professional (CISSP) or Certified Cloud Security Professional (CCSP).

Experience with technologies such as Intrusion Prevention Systems (IPS), firewalls, endpoint protection, Data Loss Prevention (DLP), encryption, Security Information Event Management (SEIM), Anti-Virus, DNS security, threat hunting, and log review.

Experience conducting security assessments, technology reviews and application requirements analysis from a security design perspective.

Knowledge of SDLC; good knowledge of IT governance and operations

Working knowledge or experience with various technologies as it relates to security including Active Directory, Group Policy, LDAP, PAM, SSL, SSO, SAML, various encryption methods/algorithms, etc.

Strong working knowledge and experience with Windows and Linux operating systems.

Professional written and verbal communication skills

Demonstrated ability to collaborate and partner with stakeholders to identify and implement technology solutions

Experience with vulnerability assessment and penetration testing tools; programming and scripting languages (Java/PHP); text manipulation tools; static and dynamic code review; OWASP security; and CSA architecture.

Experience with security, monitoring, and automation services in AWS, including VPC, Cloudwatch, Cloudtrail, and Cloudformation.

Strong scripting skills using Perl, shell, or equivalent (i.e. awk, Visual Basic). Must be able to demonstrate proficiency.

Key Success Factors:

Effectively maintains the security risk management methodology.

Effectively manages the security of systems and operates technical and process controls to optimize capability.

Conducts effective liaison with internal and external stakeholders.

Demonstrates knowledge of security standards and communicates effective best practice recommendations to management and staff.

Ensures the highest standards of conduct and professionalism are delivered at all times.


This job was originally posted as www.cwjobs.co.uk/job/79967898

Similar jobs

Similar jobs