What are the responsibilities and job description for the Senior Information Security Engineer position at QTS Data Centers?
Learn what makes QTS a unique place to grow your career!
As the Senior Information Security Engineer, you will collaborate with a dynamic team to audit, assess, and strategize the protection of our Email environments. Your leadership will drive the integration of Email Security methodologies, fostering a culture of proactive defense and resilience against sophisticated cyber adversaries.
Responsibilities::
Cloud Security Architecture Design:
The "Know Your Rights" Poster is included here:
Know Your Rights (English)
Know Your Rights (Spanish)
The pay transparency policy is available here:
Pay Transparency Nondiscrimination Poster-Formatted
QTS is committed to working with and providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please send an e-mail to talentacquisition@qtsdatacenters.com and let us know the nature of your request and your contact information.
As the Senior Information Security Engineer, you will collaborate with a dynamic team to audit, assess, and strategize the protection of our Email environments. Your leadership will drive the integration of Email Security methodologies, fostering a culture of proactive defense and resilience against sophisticated cyber adversaries.
Responsibilities::
Cloud Security Architecture Design:
- Develop and implement security architectures for Email applications.
- Evaluate and ensure secure integration of Email services.
- Conduct threat modeling and security assessments.
- Identify, analyze, and mitigate cloud-based vulnerabilities.
- Ensure Email environments comply with relevant industry standards and regulations (e.g., ISO 27001, GDPR, HITRUST).
- Develop and enforce cloud security policies and procedures.
- Lead and manage Email security incidents and investigations.
- Perform root cause analysis and develop strategies to prevent future incidents.
- Implement and manage cloud security tools (e.g., Proofpoint Suite of Tools such as TAP, TRAP ATO, etc).
- Optimize and maintain security configurations and controls in Email environments.
- Work closely with cloud engineers, developers, and other stakeholders to ensure secure Em ail deployments.
- Provide security training and guidance to internal teams.
- Continuously monitor Email environments for security threats and performance.
- Develop and implement security automation and continuous improvement processes.
- Maintain detailed documentation of security policies, procedures, and incidents.
- Prepare and present security reports to stakeholders and senior management.
- Conduct regular security audits and reviews of Email environments.
- Provide recommendations for security improvements based on audit findings.
- Bachelor’s degree in Cybersecurity, Computer Science, Engineering, or related technical discipline, or equivalent experience.
- Strong understanding of cybersecurity frameworks for Email environments, in particular, Proofpoint solutions
- 5 years of experience, or equitable experience in high paced Information Security environment(s) and security assessments, integrating teaming methodologies.
- Familiarity with relevant standards such as NIST SP800-61 Revision 2 and NIST SP800-82, ISO27k series, IEC ISA 99/62443, augmented by Red Teaming insights a plus.
- Highly desirable certifications such as GIAC GRID, Certified SCADA Security Architect (CSSA), and knowledge of MITRE ATT&CK.
- Email Security Expertise: Knowledge of Email service models
- Network Security: Understanding network security principles to protect data integrity, confidentiality, and availability.
- Cryptography: Implementing encryption algorithms and managing cryptographic keys to secure sensitive data.
- Incident Response: Quickly analyzing and mitigating security breaches or cyber attacks.
- Vulnerability Assessment: Identifying and prioritizing security weaknesses in systems.
- Penetration Testing: Simulating cyber attacks to identify vulnerabilities and improve security measures.
- Security Information and Event Management (SIEM): Using SIEM tools to monitor and analyze security events.
- Firewall Management: Configuring and managing firewalls to protect against unauthorized access.
- Malware Analysis: Detecting and analyzing malware to prevent and respond to threats.
- Identity and Access Management (IAM): Managing user identities and access controls to ensure only authorized users can access resources.
- Analytical Thinking: Ability to analyze complex security issues and develop effective solutions.
- Problem-Solving: Quickly identifying and resolving security issues.
- Effective Communication: Clearly conveying security policies and procedures to team members and stakeholders.
- Attention to Detail: Ensuring all security measures are meticulously implemented and monitored.
- Adaptability: Staying updated with the latest security threats and adapting strategies accordingly.
The "Know Your Rights" Poster is included here:
Know Your Rights (English)
Know Your Rights (Spanish)
The pay transparency policy is available here:
Pay Transparency Nondiscrimination Poster-Formatted
QTS is committed to working with and providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please send an e-mail to talentacquisition@qtsdatacenters.com and let us know the nature of your request and your contact information.