Mayo Clinicposted about 1 month ago
$100,339 - $140,462/Yr
Full-time • Mid Level
Onsite • Rochester, MN
Hospitals

About the position

The Information Security Cloud Engineer is results oriented, multi-disciplined, and comfortable working with senior engineering staff and management to implement system security solutions in multi-vendor environments and acts as an information security liaison to various business units and the information technology department to assist with the security design, consultation, and technology implementation for various Mayo Clinic projects and initiatives. The incumbent also assists system users relative to information systems security matters and undertakes moderately complex projects requiring additional specialized technical knowledge. Specifically, the engineer is knowledgeable, becoming proficient, and experienced in: Working with business partners within the department to achieve organizational and Office of Information Security goals, developing required competencies by mastering fundamental tasks, analyzing technology security posture and appropriate use of security defenses, matching technical solutions with business requirements and then participating in their design and implementation, software development, testing, support/problem solving, and overall technology administration, organizational procedures such as the system development lifecycle, use of defensive measures and information to identify, analyze and report security events, researching and understanding pertinent information technology laws, policies and procedures, establishing timelines and delivery of requirements, applying IT-related laws and policies, and providing IT-related guidance throughout the software acquisition lifecycle, collecting and analyzing information to identify vulnerabilities and potential for exploitation, managing and administering processes and tools that enable the organization to identify, document, and access intellectual capital and information content, executing duties governing hardware, software, and information system acquisition programs and other program management policies with support.

Responsibilities

  • Work with business partners within the department to achieve organizational and Office of Information Security goals.
  • Develop required competencies by mastering fundamental tasks.
  • Analyze technology security posture and appropriate use of security defenses.
  • Match technical solutions with business requirements and participate in their design and implementation.
  • Engage in software development, testing, support/problem solving, and overall technology administration.
  • Follow organizational procedures such as the system development lifecycle.
  • Use defensive measures and information to identify, analyze and report security events.
  • Research and understand pertinent information technology laws, policies and procedures.
  • Establish timelines and delivery of requirements.
  • Apply IT-related laws and policies, providing IT-related guidance throughout the software acquisition lifecycle.
  • Collect and analyze information to identify vulnerabilities and potential for exploitation.
  • Manage and administer processes and tools that enable the organization to identify, document, and access intellectual capital and information content.
  • Execute duties governing hardware, software, and information system acquisition programs and other program management policies.

Requirements

  • Master's Degree or a Bachelor's degree in Computer Science, Information Systems, Engineering or related major and a minimum one (1) year experience in the information security field required, OR Associates degree and two (2) years' experience in the information security field.
  • Understand the use and efficacy of information security tools, server configurations and controls with the ability to install, configure, test and operate them.
  • Able to test, implement, deploy, maintain, review and administer the infrastructure hardware and software required to effectively secure the enterprise, protect data, identify and mitigate risks.
  • Ability to collect, process, preserve, analyze and present computer related evidence in support of network vulnerability mitigation and/or criminal, fraud, counterintelligence or law enforcement investigations.
  • Provides technical opinions/conclusions regarding security tools, trends, and controls which are supported by documented evidence.
  • Demonstrates knowledge of standard operating procedures, workflows and supporting technology across numerous critical user areas.
  • Capacity to work independently and willingness to seek advice/assistance.

Nice-to-haves

  • Experience in Google Cloud and Azure environments.
  • Expertise in securing cloud environments using Palo Alto Prisma and cloud native tools.
  • Experience working in an Agile environment that includes daily scrums, Azure DevOps to deploy code, and Infrastructure as Code (IaC).
  • Cloud access provisioning and administration (Cloud IAM) experience across multiple CSPs (cloud service providers)/cloud environments.
  • Experience with application of cloud security controls across CSPs including identifying, configuring, and testing controls; implementing and tuning rules; and evaluating alarms.
  • Experience with Cloud ingress/egress controls.
  • Knowledge and skills with detecting data exfiltration in the cloud.
  • Knowledge of a range of cloud security tool vendors and experience working with them to optimize delivered services.
  • Expertise optimizing capabilities across multiple security tool vendors.

Benefits

  • Medical: Multiple plan options.
  • Dental: Delta Dental or reimbursement account for flexible coverage.
  • Vision: Affordable plan with national network.
  • Pre-Tax Savings: HSA and FSAs for eligible expenses.
  • Retirement: Competitive retirement package to secure your future.

Job Keywords

Hard Skills
  • Azure DevOps
  • Cloud Administration
  • Information Sciences
  • Information Technology
  • Prisma Cloud
  • 4KjMfN 1SvTMgHq082l
  • 4KMJvqkdw7CfeNj U6s mCD87
  • 5MsTkVA7oBr Q5mLZjtbY
  • 7isbt wDTSGRWgHXA
  • 7TtiSHhJjyko QEoBTNPh
  • 8nbt6hfwG ht2XDznKWUr
  • 8xsGeP21 au3LRswI
  • aFQY7MrRC AKVxk0Z7W9z
  • d7IvBpi LjKRoJMDSHgcCp
  • DrHLPS2TV 32r9zUPoxj eRn8i6wEXZ
  • GkxYiubzOvdr4 lawMKvEO
  • iCafRb5 Ja2ClHD95BzUfgs
  • ihw1D2d4t U0XMmOkw
  • kfvVl8OJPAnN yDitNHA5
  • Kohi lxyFoH3R1Uc4
  • lWVPRxuJz am5sSZ4kxoB7G
  • MiO2Tp JYInQkdu8
  • MXgrdx6 hilQLte8na2xO
  • n39e2s oylmX5YU3
  • NLdr49jQey 4sZwWGOUYozD
  • U9JFkgQiM CNUMHQTsLfnJ
  • wBndEUv3 nbuGCvlVDdTH
  • WE37AFh jPa5qCmcurnz
  • wUQXmg Z4d56MwkF
Soft Skills
  • 3LqyBvPk saqVtdGj
Build your resume with AI

A Smarter and Faster Way to Build Your Resume

Go to AI Resume Builder
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service