IT Security Architectother related Employment listings - Omaha, NE at Geebo

IT Security Architect

Known for our innovative components, Mitsubishi Electric Automotive America manufactures autonomous-ready infotainment and ADAS solutions, premium audio systems, high-definition displays, and powertrain electronics for standard, electric, and hybrid vehicles. Since 1979 we have served the major automotive, heavy-duty truck, and coach manufacturers across the US, and continue to grow each year! Be a part of a select team that is making a real impact on the automotive mobility of tomorrow!

Summary

Responsible for securing our network from the outside in and strongly influences infrastructure and network architectures. Owns security strategy, architecture, and tools and will spend more time hands-on to solve problems and implement solutions than talking about them. Owns the security awareness and vulnerability/risk management programs.

Essential Job Responsibilities

  • Perform analysis of network needs and contribute to design of network architecture, integration, and installation with a specific focus on security of these systems.
  • Align IT processes and policies with a cybersecurity framework such as NIST / ISO 27001 with special emphasis on the CIS Top 20 Critical Security Controls.
  • Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company systems
  • Leads large, highly complex technical projects to architect and deploy new, emerging software and hardware solutions
  • Leads the investigation of and response to any security-related incidents.
  • Build business cases for investments in network, infrastructure, and security-related projects.
  • Develop, deploy, and coordinate security conscious protocol, policies, and programs throughout the company.
  • Coaches and mentors System/Security Engineers and Administrators in local area network administration, engineering, and security often providing direction and feedback.
  • Manage vendor relationships for providers of network/security hardware, software, and telecommunications services.

Qualifications and Education Requirements

  • Technical degree and a minimum of ten years experience in systems support or equivalent
  • Excellent understanding of security tool planning and implementation including advanced functions such as Endpoint security software, email protection, IPS and MFA.
  • Experience with SIEM log management systems.
  • Work with CheckPoint technologies a plus.
  • Cisco, VM, or CISSP certifications a plus.
  • Strong sense of urgency in support of internal customer base. Ability to understand technical aspects of the business needs.
  • Ability to complete tasks with minimal supervision.
  • Ability to prioritize tasks, complete daily job assignments, and organize workload to accommodate competing deadlines
  • Ability to think like an attacker

INDSJF

To the extent that such laws prohibit discrimination and harassment, MEAA shall not discriminate against any applicant, associate, vendor, contractor, customer, or client on the basis of age, race, color, religion, creed, ancestry, national origin, citizenship status, sex, gender, sexual orientation, gender identity, gender expression, pregnancy, marital status, physical or mental disability, medical condition (as defined by applicable law), genetic information, military or veterans status or any other basis prohibited by law.
Click here to view the EEO is The Law Poster and the supplement.
Applicants with a disability who need assistance with the application process may contact Human Resources by email at employment@meaa.mea.com or by calling 1-800-275-5077.

Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.