This listing has expired and therefore is not publicly viewable.
|Location||Remote - HQ is NJ, Staff is remote|
|Preferred GIAC Certifications||GSEC, GCIH|
Key Functions: Develops and maintains a security operations program and executes initiatives to protect, detect and respond to security threats and incidents. Areas of responsibility include technical assessments, security information event monitoring, endpoint security, web security, vulnerability management, network & web penetration testing and threat hunting. Maintains security profiles, inventories, threats and risks for Holman companies. Recommends, implements and maintains tools and security platforms used to perform the security operations program. Manage a team of associates and potentially onsite and offsite contractors to monitor and respond to security events 24x7x365. This includes hiring, training and conducting performance reviews and coaching team members. Develops metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates. Creates measurable benchmarks to show progress on deficiencies or areas requiring attention. Leads technical security and cyber investigations. Plan and execute regular incident response and postmortem exercises.
Relevant Work Experience: Strong experience in developing and executing security architecture and strategies. This includes strategic, tactical and project level plans. Strong experience managing security information and event management (SIEM) systems, threat intelligence platforms, security automation and orchestration solutions, vulnerability management platforms, intrusion detection and prevention systems (IDS/IPS), file integrity monitoring (FIM), data loss prevention (DLP) and other network and system monitoring tools. Strong experience with common information security frameworks. Examples include: International Standards Organization (ISO) 2700x, the IT Infrastructure Library (ITIL), NIST 800-53, Cloud Security Alliance and Center of Information Security Critical Security Controls. Breadth and depth of technical and or functional expertise in security operations and other related areas within information technology departments such as Infrastructure, Engineering, Networking or Development.