Conducts application analysis and design for end users by reviewing business processes; documenting business requirements; researching potential solutions; making recommendations to meet customers' business objectives; writing program specifications; writing detailed checklists for change control implementations; writing data analysis documents; and creating technical design documentation.
Provides advanced support of developed enterprise security services by responding to customer requests, questions, and problems; working problem tickets; troubleshooting problems for root causes; reviewing problem resolutions and installation plans according to defined procedures; installing identified changes according to change procedures; using version control for maintenance of code and configuration; communicating findings and status updates for customers; carrying an on-call pager as needed; and engaging in war room or focus room meetings.
Identifies and implements security solutions and follows system evelopment processes (for example, Information Systems Development Life Cycle (ISDLC)) by gathering requested information; writing, testing, and debugging programs and scripts; using commands, utilities, or control languages; participating in code reviews; using version control for maintenance of code and configuration; monitoring alerts and other system checks and balances; checking system performance, availability, and reliability; implementing test scripts and procedures; installing and maintaining third-party software and hardware changes; implementing improvements to products, alerts, and monitors; and compiling documentation.
Participates on team projects by following company processes (for examaple, Information Systems Development Life Cycle (ISDLC)); leading small projects; gathering requested information; writing, testing, and debugging programs and scripts; implementing test scripts and procedures; testing and installing third-party software; writing instruction manuals; compiling documentation reports; and documenting application changes.
Demonstrates up-to-date expertise and applies this to the development, execution, and improvement of action plans by providing expert advice and guidance to others in the application of information and best practices; supporting and aligning efforts to meet customer and business needs; and building commitment for perspectives and rationales.
Provides and supports the implementation of business solutions by building relationships and partnerships with key stakeholders; identifying business needs; determining and carrying out necessary processes and practices; monitoring progress and results; recognizing and capitalizing on improvement opportunities; and adapting to competing demands, organizational changes, and new responsibilities.
Models compliance with company policies and procedures and supports company mission, values, and standards of ethics and integrity by incorporating these into the development and implementation of business plans; using the Open Door Policy; and demonstrating and assisting others with how to apply these in executing business processes and practices
Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications.Bachelor’s degree in Computer Science, Information Technology, or related field and 1 1/2 years' experience in information technology within the past 5 years OR 3 1/2 years' experience in information technology or related field within the past 5 years OR a Master's degree in Computer Science, Information Technology, or related field.
Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications.Certified Intrusion analyst (GCIAs), GIAC Certified Enterprise Defender (GCED), Certified Geographic Information Systems Professional (GISP), GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), Certified Secure Software Lifecycle Professional (CSSLP), Certified Information Systems Auditor (CISA), and/or Security+ certification, Mainframe Technology, Programming language or languages (for example, Java, C/C++, .NET, Rexx, Cobol, Powershell), SAP, Version control software (for example, Subversion, Git, Librarian), Writing SQL queries in a database platform (for example, Oracle, DB2, SQL Server).