Bachelor's degree in Computer Science, Information Technology, Engineering, or with relevant certifications (e.g., CISSP, CompTIA Security+) or equivalent practical experience.
Experience in managing security tools and common infrastructure services.
Knowledge of SFTP, SMTP, Proxy, DNS, Active Directory, Server/Network administration, or similar technologies.
Experience with security assessments, audits, and understanding of compliance standards.
Basic to intermediate proficiency in scripting (PowerShell, Python, JSON, XML) or automation tools for infrastructure management, with a willingness to learn.
Experience or willingness to learn about procurement and maintenance of security tools and infrastructure components.
Other Preferred Qualifications (Optional):
Familiarity with additional tools like Tenable, Splunk, Anti-Malware, Web Application Firewall, Database Activity Monitoring, or similar.
Certifications such as CISSP, CISM, CompTIA Security+, or equivalent.
Experience in automation and scripting in languages like Python, PowerShell, or Bash.
PMP certification or any Project Management experience.
SOW:
Manage and maintain security tools to ensure the protection of organizational assets and data.
Oversee the configuration, monitoring, and maintenance of common infrastructure services such as SFTP, SMTP, Proxy, DNS, Active Directory, Tenable, Splunk, Anti-Malware, Web Application Firewall, Database Activity Monitoring, etc.
Implement and maintain automation solutions to streamline infrastructure management processes.
Collaborate with cross-functional teams to address security and infrastructure-related issues.
Conduct regular security assessments and audits to identify vulnerabilities and ensure compliance with industry standards.
Troubleshoot and resolve infrastructure-related incidents and performance issues.
Incident and problem management of tools and related alerts.
Develop and maintain documentation for security and infrastructure configurations, processes, and procedures.
Stay updated on emerging security threats and industry best practices to proactively address potential risks.