Provide technical leadership in the creation, establishment, and maintenance of the information technology/security risk framework, processes, and controls, taking into consideration the overall business strategy, legal/regulatory requirements, and other best practices. Perform security assessments of applications, systems, and vendors. Manage the various risks that may threaten the success of the organization and propose methodologies to eliminate or minimize them. Essential Duties and Responsibilities Lead security investigations related to applications, user accounts, and vendors. Manage the incident response process, from detection to post-incident reporting and actions. Discuss and follow up on action plans to address recommendations from internal processes. Provide feedback during the development, review, and update of Policies, Standards, and Procedures related to Information Security. Triage new incoming issues to determine risk levels. Prepare documentation, metrics, and reports related to security assessments. Support other duties and responsibilities as assigned. Escalate issues to senior leadership if they are not being addressed promptly due to their impact on customer service. Explore building and improving tools to enhance efficiency for yourself and share those benefits with all engineers. Demonstrate proven experience in areas such as systems, incident response, network, and/or application security. AWS Cloud experience is required. Manage and enforce internal procedures and controls, problem resolution, and motivate employees to achieve peak productivity and performance. Provide advice and recommendations to Information Security Officers on security matters of interest and concern, and expert recommendations to leadership, IT managers, and peers concerning technical and programmatic information security. Oversee the cloud vulnerability management program, working with Information Security Officers and technical staff to identify and remediate vulnerabilities promptly and measure program effectiveness through clear and actionable metrics. Coordinate incident response, including planning, documentation, training, and execution of appropriate incident response to various information security scenarios. Assess information security risk for specific systems and environments and provide guidance and recommendations to improve overall risk assessment processes. Evaluate the effectiveness of security controls and provide recommendations for remediation and enhancements, particularly in the cloud environment. Develop briefs, reports, training/awareness notices, and other documents concerning information security topics. Lead and/or support various ad hoc and standing committees concerning information security topics. Education Bachelor's Degree in Computer Engineering, Computer Science, or related fields from an accredited University/College. Experience Three (3) years of cybersecurity and cloud-related experience in a complex technology environment. Certifications / Licenses Certifications and licenses are preferred but not required. Knowledge, Skills, and Abilities (KSA'S) Strong business acumen: ability to understand the needs and concerns of business stakeholders and respond promptly and effectively to stakeholder requests. Strong technical acumen: knowledge of Cyber Security, Information Security, and Information Technology concepts. Communication skills: ability to foster trusting relationships with colleagues and clients, with highly developed written and verbal communication skills. Analytical skills: ability to synthesize complex or diverse information and demonstrate attention to detail. Problem Solving: identifies and resolves problems in a timely manner; develops alternative solutions. Project Management: ability to prioritize and manage multiple projects and tasks with minimal supervision. Operational/Regulations Processes: knowledge of budget administration, resource allocation, and organizational policies. Computer and Technological Skills: proficient in MS Office 365 and experienced with data management tools such as Power Pivot and Power BI. #J-18808-Ljbffr