Company name
Littler Mendelson P.C
Location
San Francisco, CA, United States
Employment Type
Full-Time
Industry
Engineering, It
Posted on
Dec 10, 2020
Profile
\u003cp\u003e\u003cstrong\u003eKEY ACCOUNTABILITIES:\u003c/strong\u003e\u003c/p\u003e
\u003cul\u003e
\u003cli\u003eEngineering, implementing and monitoring security measures for the protection of computer systems, networks and information.\u003c/li\u003e
\u003cli\u003eUnderstanding complex technical issues and managing them within a fast-paced business environment.\u003c/li\u003e
\u003cli\u003eMonitors information systems for security incidents and vulnerabilities; develops monitoring and visibility capabilities; reports on incidents, vulnerabilities, and trends to IT or executive management.\u003c/li\u003e
\u003cli\u003eAnalyzes trends, news and changes in threat and compliance environment with respect to organizational risk; advises organization management and develops and executes plans for compliance and mitigation of risk; oversees risk and compliance self-assessments, and engages and coordinates third-party risk and compliance assessments.\u003c/li\u003e
\u003cli\u003eAnalyzes and oversees the development of information security governance, including organizational policies, procedures, standards, baselines and guidelines with respect to information security and use and operation of information systems.\u003c/li\u003e
\u003cli\u003eConfigure, troubleshoot, and maintain Infrastructure Security devices, systems, network security.\u003c/li\u003e
\u003cli\u003eWrite comprehensive reports including assessment-based findings, outcomes, and propositions for further system security enhancements.\u003c/li\u003e
\u003cli\u003eConducting proactive research to analyze security weaknesses and recommend appropriate strategies.\u003c/li\u003e
\u003cli\u003eIdentifying current and emerging technology issues including security trends, vulnerabilities and threats.\u003c/li\u003e
\u003cli\u003eThreat intelligence.\u003c/li\u003e
\u003cli\u003eOversees the response to information system security incidents, including investigation of, countermeasures to, and recovery from computer-based attacks, unauthorized access, and policy breaches; engages, interacts and coordinates with third-party incident responders, including law enforcement.\u003c/li\u003e
\u003cli\u003eSecurity incident response ownership, tracking and documentation through the entire remediation process.\u003c/li\u003e
\u003cli\u003eThis position must have excellent communication skills and must show the ability to communicate on a technical level.\u003c/li\u003e
\u003cli\u003eKnowledge in data management systems and access controls.\u003c/li\u003e
\u003cli\u003ePerform such other/additional duties as may from time to time be assigned.\u003c/li\u003e
\u003c/ul\u003e
\u003cp\u003e\u003cstrong\u003eTECHNICAL SKILLS AND COMPETENCIES REQUIRED:\u003c/strong\u003e\u003c/p\u003e
\u003cul\u003e
\u003cli\u003eThrough understanding of software vulnerabilities and ability to breakdown the vulnerably and provide explanation to both development team and management.\u003c/li\u003e
\u003cli\u003eDemonstrates experience in supporting IT security operations.\u003c/li\u003e
\u003cli\u003eDemonstrates experience in supporting IT Security devices, systems, and network security to include, monitoring, troubleshooting and maintenance\u003c/li\u003e
\u003cli\u003eKnowledge of OWASP vulnerabilities, SANS vulnerabilities and IoT.\u003c/li\u003e
\u003cli\u003eKnowledge of Cloud Security, Application development, Identity and Access management.\u003c/li\u003e
\u003cli\u003eDemonstrated ability to discuss security risks in business terms and develop practical, risk-based approach to mitigate risks.\u003c/li\u003e
\u003cli\u003eEvaluate, recommend, and utilize application security testing tools, both open source and vendor products.\u003c/li\u003e
\u003cli\u003ePerform static program analysis of the source code.\u003c/li\u003e
\u003c/ul\u003e
\u003cp\u003e\u003cstrong\u003eEDUCATION AND CERTIFICATIONS: \u003c/strong\u003e\u003c/p\u003e
\u003cp\u003eBachelor’s degree in information systems or information technology.\u003c/p\u003e
\u003cp\u003ePreferred certification CISSP and CEH\u003c/p\u003e
\u003cp\u003e\u003cstrong\u003eEXPERIENCE REQUIRED:\u003c/strong\u003e\u003c/p\u003e
\u003cp\u003e5 years related experience\u003c/p\u003e
\u003cp\u003eBackground in application development\u003c/p\u003e,EqualOpportunityEmployerDescription:null,PayTransparencyPolicyStatement:null,MatchScore:1.0,HasApplied:false,ApplicationJobBoardName:null,ApplicationJobBoardId:null,DateApplied:null,Salaried:true,CompensationAmount:null,PublishingStatus:1,Links:[],BehaviorCriteria:[],MotivationCriteria:[],EducationCriteria:[],LicenseAndCertificationCriteria:[],SkillCriteria:[],WorkExperienceCriteria:[],JobBoardMemberships:[{JobBoardId:2e3d7edd-7174-48cf-a542-539119bbcf9f,PublishedInternal:true,PublishedExternal:false,ExternalPostedDate:null,InternalPostedDate:2020-12-10T18:54:46.937Z},{JobBoardId:631c7b72-f9c7-4adf-9109-9967ce8334e4,PublishedInternal:true,PublishedExternal:true,ExternalPostedDate:2020-12-10T18:54:46.937Z,InternalPostedDate:2020-12-10T18:54:46.937Z}],AssessmentUri:null,AssessmentStatus:null,OpportunityIsClosed:false,TravelRequired:null,TravelDescription:null,SupervisorName:null,Assessments:[],ApplicationId:null});
Company info
Littler Mendelson P.C
Website : https://www.littler.com/