– Participate in the design, development and implementation of security initiatives to ensure the best possible measures are in place to maintain a secure operation
– Monitor, evaluate, and maintain systems and procedures to safeguard internal information systems and databases.
– Develop, implement, and enforce security strategies, policies and procedures. Analyze, recommend and implement security technologies such as firewalls, IDS (network and server), certificates and PKI.
Qualifications include:
– Knowledge of information security technologies, networks, and operating systems; Knowledge of risk management frameworks, industry best practices, security policy creation; Expert understanding of routing and network protocols; and Undergraduate degree.