What are the responsibilities and job description for the Information Security Engineering Analyst II position at Global Payments Inc.?
Summary
Description Summary of This Role
Develops, configures, documents, and maintains information security solutions. Installs and configures web proxies, intrusion detection systems, endpoint monitoring software, and vulnerability scanning systems. Ensures that threats and vulnerabilities to the organization’s business systems and applications (both in-house and cloud-based) are minimized. Manages encryption protocols to protect the organization's data as well as management of authentication and access controls. Evaluates information security configurations when intrusions have occurred and monitors the effectiveness of implemented changes. Monitors overall compliance with security standards and conducts periodic security reviews.
What Part Will You Play?
Minimum Qualifications
Description Summary of This Role
Develops, configures, documents, and maintains information security solutions. Installs and configures web proxies, intrusion detection systems, endpoint monitoring software, and vulnerability scanning systems. Ensures that threats and vulnerabilities to the organization’s business systems and applications (both in-house and cloud-based) are minimized. Manages encryption protocols to protect the organization's data as well as management of authentication and access controls. Evaluates information security configurations when intrusions have occurred and monitors the effectiveness of implemented changes. Monitors overall compliance with security standards and conducts periodic security reviews.
What Part Will You Play?
- Assists others delivering secure solutions and/or secure remediation solutions for moderately complex projects to the enterprise with good technical applications included.
- Supports others installing tools to specifically secure each level within security frame work for moderate projects.
- Researches and develops skills regarding new security technologies and trends while also helping to validate corporate conformance to industry standards utilizing set analysis criteria.
- Provides support for investigating intrusion incidents, conduct forensic investigations for moderate projects and helps others who provide incident responses.
Minimum Qualifications
- Bachelor's Degree
- Relevant Experience or Degree in: in Information Security or Computer Science preferred. Other majors will be considered.
- Typically Minimum 2 Years Relevant Exp
- Experience within Information Security or Information Technology. Experience managing projects. Additional 4 years related experience may be considered in lieu of a degree.
- Experience defining, implementing, and maintaining corporate security policy along with standards and procedures. Knowledge of Advanced Persistent Threats, Network access controls, gateway Anti-malware and enhanced authentication as well as experience in
- One or more of the following-CISSP, CISA, CISM, PCI-QSA, PA-QSA, PCIP, CRISC, CGEIT
- Skills / Knowledge - Developing professional expertise, applies company policies and procedures to resolve a variety of issues.
- Job Complexity - Works on problems of moderate scope where analysis of situations or data requires a review of a variety of factors. Exercises judgment within defined procedures and practices to determine appropriate action. Builds productive internal/external working relationships.
- Supervision - Normally receives general instructions on routine work, detailed instructions on new projects or assignments.
- Network Engineering - Develops an understanding of TCP/IP network connectivity, subnet segmentation, security zones, secure ports/protocols, network authentication/authorization, security tools and their applicability (WAF, IPS, Sandbox, etc.).
- Vulnerability testing, risk analyses and security assessments - Knowledge of vulnerability testing, risk analyses and security assessments
- Technical industry acumen - Knowledge of Industry regulatory audit requirements and solutions and Authentication, authorization, and encryption solutions