Resp & Qualifications
PURPOSE: Develops and implements security solutions. Administers security technology systems by architecting and engineering/developing trusted systems into secure systems. Assists in the development of implementation and deployment plans that are aligned to the organizational strategic plan objectives and security requirements. Advises management in developing cybersecurity policies, processes, and procedures. ESSENTIAL FUNCTIONS: Assists with day-to-day support of security solutions. Assists with engineering support and system administration of specialized cybersecurity solutions. Solves complex problems and answers routine questions about the installation, operation, configuration, and customization of cybersecurity software. Identifies potential conflicts with the implementation of any cybersecurity solutions. Answers routine questions about the installation, operation, configuration, and customization of cybersecurity solutions. Reviews and analyzes appropriate cybersecurity solution system logs for performance and functional anomalies. Works with system design architects and project managers to provide security requirements. SUPERVISORY RESPONSIBILITY: Position does not have direct reports but is expected to assist in guiding and mentoring less experienced staff. May lead a team of matrixed resources. QUALIFICATIONS: Education Level: Bachelor’s Degree in Computer Science, Information Technology, or related field OR in lieu of a Bachelor’s degree, an additional 4 years of relevant work experience is required in addition to the required work experience. Experience: 5 years related experience or cybersecurity certification and 3 years related experience Knowledge, Skills and Abilities (KSAs) Ability to perform risk assessments and investigate cyber security incidents. Ability to understand vulnerabilities at a technical level. Knowledge of hardware and software, networks, data centers, systems, and cyber security related issues. Proficient in ethical hacking techniques. Strong critical thinking ability and investigative/problem solving skills. Licenses/Certifications Required Upon Hire: CISSP Certified Information Systems Security Professional OR CISM – Certified Information Security Manager OR Certified Ethical Hacker (CEH) OR Certified Information Systems Auditor (CISA) Salary Range: $98,208 – $195,052 Salary Range Disclaimer The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the work is being performed. This compensation range is specific and considers factors such as (but not limited to) the scope and responsibilites of the position, the candidate’s work experience, education/training, internal peer equity, and market and business consideration. It is not typical for an individual to be hired at the top of the range, as compensation decisions depend on each case’s facts and circumstances, including but not limited to experience, internal equity, and location. In addition to your compensation, CareFirst offers a comprehensive benefits package, various incentive programs/plans, and 401k contribution programs/plans (all benefits/incentives are subject to eligibility requirements). Department Cybersecurity Operations Equal Employment Opportunity CareFirst BlueCross BlueShield is an Equal Opportunity (EEO) employer. It is the policy of the Company to provide equal employment opportunities to all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, protected veteran or disabled status, or genetic information. Where To Apply Please visit our website to apply: Federal Disc/Physical Demand Note: The incumbent is required to immediately disclose any debarment, exclusion, or other event that makes him/her ineligible to perform work directly or indirectly on Federal health care programs. PHYSICAL DEMANDS: The associate is primarily seated while performing the duties of the position. Occasional walking or standing is required. The hands are regularly used to write, type, key and handle or feel small controls and objects. The associate must frequently talk and hear. Weights up to 25 pounds are occasionally lifted. Sponsorship in US Must be eligible to work in the U.S. without Sponsorship. #LI-HS1 #J-18808-Ljbffr
risk management Data Center Critical thinking networking technologies Cybersecurity Certified Information Security Manager (CISM) hardware Certified Ethical Hacker (CEH) Ethical Hacking Certified Information Systems Security Professional (CISSP)