Job Description
Job Summary
The primary purpose of this role is to support the implementation and ongoing delivery of information security tools and processes. This includes responsibility for executing and improving processes and procedures with occasional guidance from more senior level security associates.
This role solves moderately complex problems while completing both tactical and non-tactical activities in support of the successful delivery of assigned information security processes.
The individual in this role continues to grow his/her understanding across the various tools and processes supported by the team, including the key integration points with other parts of Technology. He/she receives occasional guidance and direction from more senior level associates on the team.
With a focus specifically on Identity & Access Management, this role focuses on delivering timely, accurate, and controlled system access for the Lowe’s global workforce. This includes assisting with creating and maintaining processes, tools, controls and governance mechanisms such as roles, reports, metrics and issue resolution services
With a focus specifically on the Security Operations Center (SOC), this role supports Tier I and II functions within a 24×7 SOC environment, following established processes and focusing mostly on standard security issues. This includes activities aimed at detecting and assessing cyber security events and incidents across the Lowe’s environment.
With a focus specifically on Security Threat & Vulnerability, this role supports the execution of processes focused on vulnerability identification or remediation. This includes information security and risk activities such as oversight of vulnerability assessments and remediation programs serving both internal and external stakeholders.
With a focus specifically on Security Governance, Risk and Compliance, this role completes activities that help drive awareness and adherence to information security policies and standards. Tasks include collecting and reviewing metrics, monitoring programs for compliance, and performing risk assessments, and working with others to implement appropriate controls.
Qualifications
. Bachelor’s Degree in Computer Science, CIS, Engineering, Business Administration, Cybersecurity, or related field (or equivalent work or military experience in a related field)
. 2 years of experience in information security
. Basic understanding of fundamental security and network concepts (Windows and Unix security: OS lockdown logging and monitoring application security user access perimeter protection principles, network communication rules intrusion detection and analysis methods etc.)
. IT experience in the retail industry
. Relevant information security certifications (e.g., CISSP, CISM, CEH, PCI ISA, CRISC, CISA, OSCP, GPen)
Identity & Access Management
. Experience with IAM technology implementation and operations (e.g., CA, Sailpoint, OKTA, SSO, MFA, IGA, Microsoft AD) (specific to Identity & Access Management role)
Security Operations Center (SOC)
. Willing to work in a team-oriented 24/7 SOC environment flexibility to work on a rotating schedule (including occasional shift work) (specific to Security Operations Center role)
. Basic knowledge of Microsoft and Google cloud platforms, to include knowledge of all feature sets applicable to security event detection and monitoring (specific to Security Operations Center role)
. Basic understanding of incident response activities: detecting, analyzing, and responding to various types of malicious activity (specific to Security Operations Center role)
. Basic knowledge of Microsoft and Google cloud platforms, to include knowledge of all feature sets applicable to security event detection and monitoring (specific to Security Operations Center role)
. Previous experience working in a Security Operations Center (SOC) environment (specific to Security Operations Center role)
. Experience with malware analysis (specific to Security Operations Center role)
Security Threat & Vulnerability
. Basic knowledge of threat intelligence, threat hunting, attack surface management and investigations support functions (specific to Security Threat & Vulnerability role)
. General understanding of the output from cybersecurity scanning technologies to include operating systems, Custom Code, Web-based vulnerability analysis, 3rd party installed and hosted applications, cloud-hosted compute platforms, and microservices (specific to Security Threat & Vulnerability role)
Security Governance, Risk & Compliance
. 1 year of experience developing Cybersecurity or information assurance policies, standards, awareness training, or equivalent issuances (specific to Security Governance, Risk & Compliance role)
. 1 year of experience conducting assessments or technical reviews to analyze risk (specific to Security Governance, Risk & Compliance role)
. Experience with information security programs, audits, controls, assessments, risk assessments, or remediation management (specific to Security Governance, Risk & Compliance role)
. Relevant information security certifications (e.g., CISSP, CISM, CEH, PCI ISA, CRISC, CISA, OSCP, GPen) (specific to Security Governance, Risk & Compliance role)
. Experience conducting information security risk assessments of vendors and vendor software (specific to Security Governance, Risk & Compliance role)
Job Description Tasks and duties 1. Working with a sales team to determine solutions to customers challenges and supporting the...
Apply For This JobJob Description What Application Development & Maintenance brings to Cardinal Health: Information Technology oversees the effective development, delivery, and operation...
Apply For This JobJob Description :We are looking for an eager learner, and team player as a Business Analyst in the Social commerce...
Apply For This JobQA Analyst – (CREQ146734)DescriptionApplication Support, SQL, PLSQL, UNIXVBA, Execel, Testing tool, SeleniumExp: 4 to 8 yearsApplication Support, SQL, PLSQL, UNIXVBA,...
Apply For This Job#WeAreCrowdStrike and our mission is to stop breaches. As a global leader in cybersecurity, our team changed the game. Since...
Apply For This JobJob Description : Data Analyst Bangalore About Flipkart In 2007, we started the Flipkart journey by selling books online. But...
Apply For This Job