Senior Specialist, Information Security 1 at Celestica
Indiana, Indiana, USA -
Full Time


Start Date

Immediate

Expiry Date

15 Jun, 25

Salary

0.0

Posted On

16 Mar, 25

Experience

4 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Information Security, Mechanisms, Regulations, Communication Skills, Penetration Testing, Mysql, Leadership Skills, Design, Computer Operations, Information Security Standards, Analytics, Business Continuity, Consideration, Oracle, Security, Change Management, Sql

Industry

Information Technology/IT

Description

Req ID: 125185
Remote Position: Yes
Region: Americas
Country: USA
State/Province: New Hampshire
City: Remote Employee US

SUMMARY

The senior specialist in information security will participate in PoC/Pilots for new security technologies and/or capabilities. They will assess new security solution partners and define company security policies and standards. The incumbent will need to understand business and network risks and be able to provide appropriate recommendations to address/resolve them.

DETAILED DESCRIPTION

Performs tasks such as, but not limited to, the following:

  • Be able to configure and manage key security solutions administratively
  • Manage an enterprise-sized solution base of more than 15,000 endpoints
  • Provide 3rd level security solution support, ensuring the specified service levels are met
  • Able to make low-level risk assessments of requested changes - making sound decisions before modifying system parameters. Able to quickly understand the functionality and technology of operating systems, critical applications, and their potential significant issues.
  • Able to quickly understand the functionality and technology of operating systems, critical applications, and their potential significant issues.
  • Able to provide input and work with the more prominent security team members to develop and refine additional monitoring content and use cases. Keep and relay the detailed status reports of weekly activity.
  • Exercise basic forensic skills related to providing only relevant data when and for what is being requested
  • Provide general security advice/consultation to application/platform owners and convey complex technical details in a short and easy to understand manner
  • Upgrade/install application or operating system software and hardware.

KNOWLEDGE/SKILLS/COMPETENCIES

  • Proficient in Information Security
  • Proficient in Risk Mitigation and Business Controls
  • Proficient in Data Management and Analytics
  • Intermediate level of understanding in Project Management as well as Change Management
  • Intermediate level of understanding in Architecture and Solution Integration
  • Proficient in Business Partnering
  • Proficient in IT Penetration Testing, IT Vulnerability assessments, IT Incident Response Management and IT Security Architecture
  • Proficient knowledge of information security standards and regulations
  • Knowledge of software design process and data modeling
  • Knowledge of computer operations/applications support in client/server environment
  • Knowledge of IT requirements for an end-to-end solution, including security, business continuity, and disaster recovery
  • Knowledge of team budget and tracking mechanisms
  • Knowledge of IT delivery/operations, analysis, design, and development
  • Skills and Experience in installing and managing complex security solutions
  • Skills and Experience in at least two Platforms
  • Ability to predict, detect, and respond to potential malicious factors
  • Excellent operating systems knowledge (both Microsoft and *NIX)
  • Knowledge of MySQL, SQL, or Oracle DBs is an advantage
  • Excellent resource management and prioritization skills
  • Strong leadership skills and ability to work in a team environment
  • Excellent verbal and written communication skills and ability to provide functional or technical project advice to individuals outside the immediate work unit/team

TYPICAL EXPERIENCE

  • 4 to 6 years of relevant experience in configuring, managing and solutioning complex security requirements for one or more business environments.

TYPICAL EDUCATION

  • Bachelor’s Degree or consideration of an equivalent combination of education and experience.
  • Educational Requirements may vary by Geography

NOTES

This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.
Celestica is an equal opportunity employer. All qualified applicants will receive consideration for employment and will not be discriminated against on any protected status (including race, religion, national origin, gender, sexual orientation, age, marital status, veteran or disability status or other characteristics protected by law).
At Celestica we are committed to fostering an inclusive, accessible environment, where all employees and customers feel valued, respected and supported. Special arrangements can be made for candidates who need it throughout the hiring process. Please indicate your needs and we will work with you to meet them.

Responsibilities
  • Be able to configure and manage key security solutions administratively
  • Manage an enterprise-sized solution base of more than 15,000 endpoints
  • Provide 3rd level security solution support, ensuring the specified service levels are met
  • Able to make low-level risk assessments of requested changes - making sound decisions before modifying system parameters. Able to quickly understand the functionality and technology of operating systems, critical applications, and their potential significant issues.
  • Able to quickly understand the functionality and technology of operating systems, critical applications, and their potential significant issues.
  • Able to provide input and work with the more prominent security team members to develop and refine additional monitoring content and use cases. Keep and relay the detailed status reports of weekly activity.
  • Exercise basic forensic skills related to providing only relevant data when and for what is being requested
  • Provide general security advice/consultation to application/platform owners and convey complex technical details in a short and easy to understand manner
  • Upgrade/install application or operating system software and hardware
Loading...