Severity: Notice
Message: MemcachePool::get(): Server 127.0.0.1 (tcp 11211, udp 0) failed with: Connection refused (111)
Filename: drivers/Cache_memcached.php
Line Number: 142
Backtrace:
File: /home/theinjobs/public_html/application/controllers/Indeed.php
Line: 536
Function: get
File: /home/theinjobs/public_html/application/controllers/Indeed.php
Line: 863
Function: indeed_job_details
File: /home/theinjobs/public_html/index.php
Line: 316
Function: require_once
Employment Type : Full-Time
SUMMARY: As the Security Engineer, team’s main point of contact for all technical IT Security solutions, new risks and threats, secure system configurations, architectures, and technical designs and implementations. Support integrated and dynamic defense and IT Security solutions to deliver vulnerability management services, including leveraging network scanning tools to identify vulnerabilities, employ mitigations, and ultimately remediate system deficiencies. Responsible for the research of new threats and vulnerabilities and brief Chief Information Security Officer (CISO) and other Service Unit Directors, to keep the client updated with the latest risks. Development and updating of documentation such as configuration management guides, technology administration guides and Standard Operating Procedures (SOP’s) is required. The Security Engineer and execute the following activities are conducted: Application Security Assessments; development of Hardening Guides and Secure Baseline Configuration (SCB’s); Vulnerability assessments, database scans, secure code analysis, web application scans, penetration test and Security Controls Assessments (SCA’s) are successfully performed and the appropriate level of analyst are performed for systems and applications. The Security Engineer / technical Lead will develop, oversee, and manage all testing schedules and ensure staff is fully and appropriately utilized, deliverables are submitted, and deadlines are met. The Security Engineer evaluate security products (new and existing) to ensure proper functionality, configuration, implementation and usage, eliminate duplication of tolls, recommend new tools, and ensure compatibility with information security policy. Performs routine audits and vulnerability scans to ensure compliance with security policy. Participates in audits or reviews of desktop systems, operations methods, and assessment risks. Assist with the development of policy related to IT Security. Develop, submit and brief Weekly and Monthly Status Reports on all activities and conducted briefings for client and team, as necessary. Manage, communicate, and contribute to the expansion, growth, and success of the IT Security Program. ESSENTIAL FUNCTIONS: QUALIFICATIONS: Required Skill and Experience: Education: Certifications: Clearance: Work Location and Hours: Powered by JazzHR 7rb4Rdo3Gk