ACL Digitalposted 6 days ago
- Senior
Austin, TX
Professional, Scientific, and Technical Services

About the position

At a senior level, maintains and operates a variety of security measures and software that perform cybersecurity functions such as access control, monitoring or vulnerability assessment. Provides support to the end-user community and ensures they have up-to-date protection from malicious software and other cyber threats. Tests and recommends security measures to remediate and mitigate risk. Provides reports and other information related to information security issues as requested by management and other groups. Performs evaluation and analysis of security applications and systems and makes recommendations to management. Recommends best practices to ensure system security across the enterprise. This position utilizes in-depth knowledge of best practices and experience in own discipline to provide and improve services. Takes a new perspective to solve complex problems. Works independently and receives minimal guidance. Acts as a resource for colleagues with less experience. May direct the work of other staff members.

Responsibilities

  • Performs risk assessments and recommends security measures.
  • Monitors security systems for possible intrusion.
  • Interacts with end users concerning malware, spam, vulnerabilities and any other cybersecurity issues.
  • Reviews and creates audit reports on user and system activities.
  • Reviews system generated logs for anomalies and takes appropriate actions.
  • Actively probes the network for new threats and risks.
  • Documents, deploys, reviews and maintains cybersecurity policies, standards, guidelines and procedures.
  • Plans and implements cybersecurity technology projects.
  • Provides business continuity/disaster recovery and risk analysis expertise.
  • Monitors security alerts on internet and other intelligence feeds and determines whether reported threats could impact information technology or operational technology systems.
  • Provides technical consulting to other groups on cybersecurity requirements.
  • Implements and ensures technical security systems including SIEM, VAT, network IDS, antivirus, web and email filters and firewalls.
  • Performs cybersecurity incident response activities.
  • Documents and maintains objective evidence to demonstrate NERC CIP regulatory compliance.
  • Creates and delivers security training materials and classes for asset owners, software developers and system administrators.
  • Provides oversight regarding compliance with security regulations, standards and laws.

Requirements

  • A degree(s) in information technology, computer science or relevant field may be substituted per guidelines for certain years of experience.
  • Nine or more years of experience in cybersecurity or relevant experience.

Nice-to-haves

  • CISSP, GIAC or similar certification
  • NERC Compliance Understanding
Hard Skills
Asset Management
1
Cyber Security
1
Email Filtering
1
Incident Response
1
Microsoft Software
1
2MTrvI u2Yzw7QK8E
0
4OGE6wWB 7TySHp80UskZ
0
96TujcZU 2R9pDSXfMoNa
0
DKGuxXhUY 79tafMRb
0
DYko8vUMw4R YITCALvof3q
0
Dh0SW Wfr0bJoR1zB
0
E1ANWp 1E7crFjo
0
Enu2 6QeGDLo
0
FaTm95n3P meNgyIhpfvB
0
HeP1XVgcZf8 tZQ0UcDjBKw
0
KyN6FrYeRL7 kVJjWwzKr
0
Nl0Qg1O gWXS8TYVA mhFi79pce
0
PIZX6w4W85tK Wu0XJlEI6Ob
0
R97xvpiEX mfAWrleK1Jo
0
RGr0j 5N02ZlU8cR6
0
RsHaAGbDY a1QXTBivsdSF
0
U6QgForN1 oAPCaSnY
0
UFvWJ 9w5Y1VivAj6
0
ZPoKD 4LDJGCP8b
0
bwq4VPZvH Ct1hzexJToRV8Oav
0
gEuyZDHcQY72mJ 0HMDNJSxyfju
0
hKUkXZ17yB qZvCUT6MNIcxhy
0
iVSokPs74 VXTUDEpl6W
0
jNg6MkD RoVjF9YWJCAtns 6cVLWv8
0
kHldqDy2i 3q6d57rj
0
kTHml aRMmH
0
mDkXQwbZo xpEdMk4q
0
nsMNIJ3 XurdCmSlK
0
o4bJaDjOzK ZbGRLUkApoD
0
oD6hm7I3zn98RPe Wen19qhKtS7
0
tWqY IiU4RYuEjp
0
uFn8TvG SlnNsYhAMR9
0
yOD5VSERJ kxUCBl2F6ASZLrt
0
zres6PFfLOu cvJoWwA1Oep
0
Soft Skills
FxIBGUNt eAgMLjcx Z7624prl
0
mUHPKIl7kOy w731xuE
0
wNEfuV3veRspx r0ascn56H
0
Build your resume with AI

A Smarter and Faster Way to Build Your Resume

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service