Cybersecurity Operations Lead

at  Fisher Phillips LLP

Atlanta, GA 30328, USA -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate08 Jul, 2024Not Specified09 Apr, 2024N/ALoss Prevention,Teams,Operating Systems,Testing,Encryption,Traceroute,Regulatory Requirements,Cobit,Security Investigations,Endpoint Protection,Email Security,Educational Programs,Hipaa,Decision Making,Ethics,Vulnerability,Intrusion Detection,Nist,ItilNoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

CYBERSECURITY OPERATIONS LEAD

At Fisher Phillips, we know exceptional talent is the key to our success, to providing the best service to our internal and external clients. Being a part of the Fisher Phillips team means you will work with cutting edge technology in a professional and fun environment under leadership ready to invest in your professional development. If you have a growth mindset, are eager to challenge yourself, and desire to work with a team of professionals instituting change on an ongoing basis, keep reading.

QUALIFICATIONS

  • Bachelor’s degree in information security and/or (5) years of information security experience in complex technology environment.
  • Relevant Cybersecurity certifications preferred (CISSP, CISA, CISM, etc.).
  • Knowledge of common information security management frameworks (HIPAA, ISO/IEC 27001, ITIL, NIST, COBIT, ITL, etc.).
  • Experience with the management of endpoint protection, intrusion detection, security event monitors, email security, firewalls, and other security devices/tools.
  • Proven ability to manage the deployment of technology projects from initial procurement to testing, implementation, and administration/monitoring.
  • Knowledge of Data Loss Prevention (DLP) principles and administration of DLP tools and policies.
  • Knowledge of incident response methodologies.
  • Knowledge of common hardware and operating systems.
  • Experience with large-scale server virtualization administration.
  • Knowledge of cyber threats, vulnerabilities, and threat hunting processes.
  • Knowledge of adversarial tactics and techniques.
  • Understanding of security awareness training, educational programs, and on-going communication of information security threats.
  • Experience with conducting information security investigations and responding to alerts from email security, endpoint protection, and SIEM tools.
  • Knowledge of vulnerability threat management and remediation actions.
  • Knowledge of cybersecurity, ethics and privacy principles, along with related regulatory requirements.
  • Knowledge of encryption algorithms, cryptography, and key management.
  • Ability to collect and analyze data to guide decision making.
  • Ability to interpret the information collected by network tools, such as Traceroute, Ping, packet captures, etc.
  • Ability to analyze and categorize vulnerabilities in information systems.
  • Ability to organize, standardize, and manage detailed information.
  • Ability to work collaboratively and effectively in and between teams.
  • Ability to prioritize, managing multiple competing work efforts.
  • Strong interpersonal, collaboration, and conflict resolution skills. Ability to exercise strong judgment in analyzing, appraising, evaluating, and solving problems of a difficult procedural, organizational, administrative, or technical nature.
  • Strong self-motivation.

Responsibilities:

  • Monitor, interpret, and assess the information provided by Firm security applications and respond to incidents as appropriate
  • Perform ongoing internal vulnerability scanning and create remediation requests and status reports
  • Review current state of information security and performs regular audits of access permissions
  • Conduct ongoing risk assessments of current and potential third party vendors
  • Ensure authorized access by investigating improper access, revoking access, and reporting violations
  • Manage Data Loss Prevention (DLP) policies and investigate related events
  • Identify and investigate relevant security alerts originating from anti-virus, firewall, and file monitoring systems
  • Respond to email related security alerts including phishing and malware remediation actions
  • Assist in developing security awareness globally by providing orientation, educational programs, and on-going communications
  • Update job knowledge by participating in educational opportunities, reading professional publications, maintaining personal networks, and participating in professional organizations.
  • Assist in providing requested security control evidence and completion of client data security audits.


REQUIREMENT SUMMARY

Min:N/AMax:5.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Software Engineering

Graduate

Complex technology environment

Proficient

1

Atlanta, GA 30328, USA