Great benefits. Competitive pay. We know these are some of the things people look for in a job. But if you're the kind of person who also cares about making an impact and serving our nation's wounded warriors and their families, then you're exactly the kind of person we're looking for. When you join Wounded Warrior Project, you're committing to making a difference. We make a commitment to you too - helping you to find that spark, ignite your passion to serve, and embark on a career with meaning and purpose. At Wounded Warrior Project we recognize our mission cannot be accomplished without our talented teammates, which is why we're proud to offer benefits such as:
A flexible hybrid work schedule (3 days in office, 2 days' work from home) Full medical, dental and vision coverage for both teammates AND family members Competitive pay and performance incentives A fun, mission focused and collaborative team environment
A mission that matters is just the beginning, so if you're ready to get started, we're ready for you. The Wounded Warrior Project (WWP) Information Security Engineer serves as a subject matter expert regarding the security of WWP's technology infrastructure and information. This position leads the effort to design and implement security solutions to protect WWP information and educate the organization regarding security best practices.
ESSENTIAL DUTIES & RESPONSIBILITIES:
- Develops, implements and maintains security strategies, platforms and overall architecture
- Installs, configures, monitors, troubleshoots and maintains security platforms and solutions
- Configures and monitors security event management platform (SIEM)
- Serves as security subject matter expert to organization and vendors
- Defines, measures and reports on security metrics
- Provides technical guidance to security analysts and other IT teammates
- Takes initiative to conduct research and remain current with the latest security trends and threats
- Investigates, remediates and reports on security threats and incidents
- Evaluates new technologies and processes that enhance security capabilities
- Designs and configures data encryption and data loss prevention solutions
- Performs vulnerability scans, risk analysis and security assessments, and leads remediation efforts
- Analyzes existing security measures and recommends improvements
- Participates in the evaluation, selection and implementation of technology solutions
- Prepares and maintains security documentation to include the development of security training
- Other related duties as assigned
KNOWLEDGE, SKILLS, & ABILITIES:
- Strong knowledge of identity management, access controls, permissions and privileges, encryption, web security, intrusion prevention and data loss prevention
- Passionate about technology and solving IT security challenges
- Ability to work effectively with staff, peers, and others in and outside the organization to accomplish goals, objectives and to identify and resolve problems
- Strong documentation and training skills
- Highly analytical - strong problem analysis/diagnostic and resolution skills
- Strong configuration and design skills
- Self-motivated and able to work within a project-based environment; takes initiative to drive projects to completion
- Demonstrated ability to work independently
- Exercise confidentiality and good judgment when working with sensitive issues
- Excellent verbal and written communication skills with ability to effectively communicate with users of diverse backgrounds and skill levels
- Unequivocal commitment to the highest standards of personal and business ethics and conduct
- Excellent organizational and multi-tasking skills
- Contribute to a positive work environment and overall team effort in the department and organization
- Ability to influence others without having direct authority
- Ability to work well under pressure and handle multiple projects and deadlines
- Exceptional interpersonal skills; team player
- Ability to work in an extremely fast paced and changing environment
- Independent thinker with the ability to utilize critical and analytical skills in problem solving
- Strong problem determination and resolution skills
- Team-oriented and a desire to engage with others on day to day activities
- Proficient with Microsoft Office and Visio
EDUCATION & EXPERIENCE REQUIREMENTS:
- Bachelor's degree in Computer Science, Information Systems, or other related field or equivalent work experience required
- Minimum of five (5) years of experience working in information security
- Minimum of three (3) years of experience performing incident and vulnerability management
- Minimum of three (3) years of experience working with software and hardware vendors preferred
- Demonstrated experience with defense in depth, access controls, privileges and permissions
- Demonstrated experience with defining security strategies and architecture
- Deep-seated experience with recent Microsoft desktop and server operating systems
CERTIFICATIONS & LICENSURE:
- Information Security certifications preferred (CISSP, CISM, CEH)
PHYSICAL REQUIREMENTS & ESTIMATED FREQUENCY:
- Walking: Frequently
- Speaking: Frequently
- Hearing: Frequently
- Vision: Frequently
- Sitting for extended periods: Frequently
- Standing for extended periods: Intermittently
- Extended periods viewing computer screen: Frequently
- Lifting/carrying up to 20 pounds various items: Rarely
- Lifting/carrying more than 20 pounds various items: Rarely
- Pushing/Pulling: Rarely
- Bending/Stooping: Rarely
- Reaching/Grasping/Manual Dexterity: Intermittently
- Writing: Frequently
- Climbing: Rarely
- Exposure to outdoor elements: Rarely
- Travel: Up to 25%
*ca-ml Wounded Warrior Project is an equal opportunity employer committed to providing equal employment opportunity to all persons without regard to race, color, religion, national origin, gender, gender identity, sexual orientation, marital status, citizenship, age, veteran or military status, disability, genetic information, or any other characteristic protected by law. Please note: Wounded Warrior Project is not seeking assistance or accepting unsolicited resumes from search firms without a written search agreement in place. All resumes submitted by search firms to any employee at Wounded Warrior Project via email, the Internet or directly to hiring managers at Wounded Warrior Project in any form without a valid written search agreement in place will be deemed the sole property of Wounded Warrior Project, and no fee will be paid in the event the candidate is hired by Wounded Warrior Project as a result of the referral or through other means."
|