Schedule: Full-time
WORK ENVIRONMENT
When you join our team, you'll experience the flexibility, autonomy, trust, and collaboration we believe creates a safe, innovative, and thriving environment. After all, we[re hiring you not only for the skills and experiences you possess today, but also where you'll grow tomorrow.
Collaborative environment
Continuous Learning + education and conference allocation
Business casual dress code
RESPONSIBILITIES
You'll primarily work with various information security-related technologies as we solve some of the biggest challenges facing the organizations we serve. You will be extected to approach technical decisions pragmatically to ensure the value of the work is the top priority. You'll demonstrate a strong aptitude for learning new skills as well as sharing and teaching your area of expertise. You'll plany an integral role in impacting team culture, practice, and engagement.
Serve as lead for Legislature-wide information security initiatives
Implement and operate security tools, working closely with Legislative IT teams to ensure timely remediation of vulnerabilities and exposures
Collaborate with other LIS engineers to ensure operational excellence
Create configuration and troubleshooting documentation
Contribute to troubleshooting and technical support
QUALIFICATIONS
Human Skills:
Strong Communication Skills - written, verbal, listening, and questioning - ability to explain security concepts to both technical and non-technical audiences
Problem Solver - understanding the problem, rather than just executing a task
Self-starter, initiative, drive, willingness to engage in improving the team
Continuous learning mindset - stay updated on the latest security risks and best practices
Collaborative - building partnerships with LIS Engineering teams and Legislative agencies
Passionate about advocating for improving security practices across the organization
Able to work with business systems owners to identify critical assets, security posture
Technical skills:
Experience with enterprise networks, IDS/IPS, firewalls, and network security.
NAC, identity management, authentication, and access management controls
Implementing hardening techniques for Windows, Linux, and mobile devices
Identifying, assessing, and mitigating vulnerabilities in applications and networks
Analyzing security logs to identify malicious activity and potential threats
Detecting, analyzing, containing, and recovering from security incidents
Experience configuring and using SIEM solutions
In-depth understanding of cloud security policies and implement them in an organization
Ability to build security policies and implement them in an organization
Certifications desired: CISSP or SSCP