This role will be a focal point in the engineering of cloud-based cybersecurity technology, procedures, and compliance. The role will primarily work with IT and the business as the Information Security / Cybersecurity technical resource.
The position will also interact with external information security partners, vendors, and IT auditors.
Please double check you have the right level of experience and qualifications by reading the full overview of this opportunity below.
WHY JewelersMutual :
We are a financially secure, exceptionally positioned, and intellectually curious company driven by our core values of Agility, Accountability and Relevancy! We continue to raise the tide of the jewelry industry we’ve served since 1913 through our innovative people, our unyielding customer commitment, and evolution of our products and services to be the most trusted advisor to all we serve.
With a generous benefits package, office locations throughout the United States, and a mantra of making your mark today , consider evolving your career and shining bright with Jewelers Mutual Group!
Essential Duties and Responsibilities include the following. Other duties may be assigned.
- Develop and maintain secure, resilient enterprise-grade cloud processes in tandem with architects and system engineers.
- Configuration and monitoring security technologies within Azure (primary), AWS, and GCP.
- Be the primary engineering contact with MDR service provider.
- Implementation, configuration, and maintenance of assigned security technologies such as : DLP, SIEM, IAM / PAM, Web Proxies, EDR, Vulnerability Scanners, External Attack Surface Reduction, CSPM, Cloud Security Toolsets (EntraID, AWS Watchguard & Cloudtrail, etc.).
- Analyze, troubleshoot, and investigate security-related information systems’ anomalies based on security platform reporting, network traffic, log files, and host-based and automated security alerts.
- Perform technical audit remediation.
- Assist in security governance.
- Assist in the development of IT security architecture, controls, processes, standards, policies, and procedures that are aligned with the enterprise policies.
- Ensure readiness for internal / external audits related to IT security and manage external information security partners.
- Lead medium to large projects and initiatives that support information security practices and policies.
- Partake in off-hours support rotation as required.
- Experience with security frameworks such as NIST CSF, CIS, etc.
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Leadership Responsibilities
None
Qualifications
- Bachelor’s degree from a four-year college or university is preferred.
- Minimum of 5 years of hands-on, verifiable technical experience required.
- Expert level knowledge of Azure, focused on the security components including network security, Azure Firewall, Azure WAF, Azure Frontdoor, Azure Governance, etc.
- Expert level knowledge of various security tools operating in a cloud environment, with EntraID and Microsoft Defender as primary and AWS as secondary.
- Strong understanding of SIEM management, MS Sentinel preferred.
- Strong understanding of enterprise cloud computing environments, distributed applications, and cloud network / network security layers.
- Strong understanding of enterprise, network, system, and application-level security technologies.
- Understanding of system hardening processes (CIS), tools, guidelines, and best practices.
- Fundamental or greater understanding of encryption technologies.
- Excellent verbal and written communication skills.
- Ability to manage medium to large information security projects (or initiatives) while maintaining high levels of quality and effectiveness.
- Comfortable with working through ambiguity to clarify requirements and develop effective solutions.
- Demonstrates proficiency in Microsoft Office productivity tools (Word, Excel, PowerPoint, etc.).
- Understanding of Cyber Security and IS practices and principles preferred.
- Strong understanding of common technical, data, and security principles is preferred.
Certifications, Licenses, Registrations
Certifications : AZ-500, SC-100, AZ-305, CISSP, CCSP, GCLD, GCSA, GSEC, or equivalent preferred.
Physical Requirements
- Prolonged periods sitting at a desk and working on a computer.
- Occasionally required to stand; walk; use hands to finger, handle, or touch objects or controls; and talk or hear.
J-18808-Ljbffr