What are the responsibilities and job description for the Information Security Engineer II position at First Command?
An Information Security Engineer leads the way in safeguarding our organization’s computer networks and systems. They plan and carry out security measures to monitor and protect sensitive data and systems from infiltration and cyber-attacks. This role focuses on managing, designing, and enhancing our IAM infrastructure, with a particular emphasis on leveraging the SailPoint Identity Platform.
All the relevant skills, qualifications and experience that a successful applicant will need are listed in the following description.
What will you be doing?
Provides expertise and input on the Identity and Access Management program, platform management, issues, and direction so that appropriate and effective solutions can be developed.
Provides expertise and input on emerging security technologies, issues, and direction so that appropriate and effective security solutions can be developed.
Work with IT and Security Operations to resolve incidents and report on events.
Recommends security controls for new technologies to address such areas as infrastructure, security administration, user identification, authentication, access to data, monitoring, and reporting.
Participates as a key member of the Security Incident Response Team (SIRT).
Effectively plans and manages information protection initiatives and projects to ensure that objectives and schedules are met.
Stay up to date on new information technologies and apply those innovations in the company’s security standards and best practices.
Collaborate with team members as well as other business functions, business partners, management, vendors, and external parties for information gathering and best practice recommendations.
Maintain, manage and update the process for handling security incidents, and respond to security incidents.
Team specific and organization-wide knowledge sharing.
Evaluate Cloud service and other third-party providers for connection to the SailPoint platform.
What skills / qualifications do you need?
Education
Bachelor’s degree in computer science, Information Technology, or an Engineering related field, or equivalent experience.
Required : SailPoint Certified IdentityNow / IdentityIQ Professional or SailPoint Certified IdentityNow / IdentityIQ Engineer.
Work Experience
Minimum 5 years’ experience working in an IT Security capacity.
Minimum of 3 years’ working with SailPoint as an Identity and Access Management platform.
Experience with information security policy design.
Strong understanding of IAM principles, including authentication, authorization, RBAC, and identity governance.
Proficiency in scripting and automation using Java, Python, PowerShell, or similar languages.
Familiarity with directory services (e.g., Active Directory, LDAP) and single sign-on (SSO) technologies.
Experience participating in security audits.
Experience with monitoring for security events, evaluating and responding where appropriate.
Certifications
Relevant Security certification(s) such as : CIAM, CISSP, Microsoft Certified Systems Administrator : Security, CCSP, CCNA, and CCNP : Security.
Required Knowledge, Skills and Abilities
Hands-on experience in developing and managing the SailPoint Identity and Access Management platform.
Experience integrating SailPoint with cloud platforms (e.g., Azure AD, AWS).
Familiarity with Privileged Access Management (PAM) tools and concepts.
Diligence in producing and maintaining documentation and evidence, especially for compliance activities.
Detailed knowledge of ISO, NIST, and other information security standards, laws, and regulations.
Possess strong analytical skills.
Must be a self-starter and comfortable with self-directed learning on industry risks and changes.
Good oral and written communication skills.
Ability to speak confidently when dealing with internal constituents.
Identifying complex problems and reviewing related information to develop and evaluate options and implement solutions.
Incorporate industry security standards into practical security operations, network operations, and application development practices.
Knowledge of computer networking concepts and protocols, and network security.
Must have a working knowledge of the Agile Framework.
Keep a pulse on the job market with advanced job matching technology.
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution.
Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right.
Surveys & Data Sets
What is the career path for a Information Security Engineer II?
Sign up to receive alerts about other jobs on the Information Security Engineer II career path by checking the boxes next to the positions that interest you.