Information Security Engineer,II Internet & Ecommerce - Springfield, MO at Geebo

Information Security Engineer,II

Company Name:
Jack Henry and Associates
Job Description
SUMMARY
Jack Henry & Associates is seeking an Information Security Engineer II. This position will need to have a technological aptitude and be able to function as a liaison between internal auditors and federal examiners. This position will assist with gathering required audit information, follow up with audit findings to assist in correction of issues. This position will also maintain and upkeep the corporate security awareness program, as well as external customer security requests.
MINIMUM QUALIFICATIONS
Minimum of 3 years of experience in technical and/or security audits or related field; or
An equivalent combination of education and experience sufficient to successfully perform the essential functions of the job.
Excellent communication skills both verbal and written
Experience in project management or similar role
Able to handle multiple tasks simultaneously, and prioritize and organize a diversified workload.
Able to learn diverse network and information securities technologies and principles.
Strong knowledge of principles, practices, and procedures of information security as it applies to and impacts the organization.
Strong knowledge of regulations, security practices, and vulnerability scanning tools
PREFERRED SKILLS
Bachelor's degree preferred
CISSP certification preferred
CISA certification preferred
ESSENTIAL FUNCTIONS
A seasoned, experienced professional with a full understanding of area of specialization. Works on moderately complex and diverse projects. Exercises good judgment in selecting methods and techniques for obtaining solutions.
Develops the security of electronic information and establishes security systems, policies and procedures to prevent system compromise or infiltration.
Establishes appropriate firewall standards and designs and implements security policies to control system access.
Develops and implements standards for appropriate security checkpoints and encryption methods.
Assesses the impact on the business caused by theft, destruction, alteration, or denial of access to information.
Develops policies & procedures to ensure the security of relevant solutions.
Investigates, recommends and monitors implementation of new security products and services. Acts as a central point of contact for internal and external customers on security issues.
Participates in product Change Control Boards and work with other JHA departments to ensure security of products and services.
Monitors and evaluates internal and external security threats. Researches security threats and implement appropriate changes to the Security program to prevent company and customer data assets from being compromised.
Acts as an escalation point for complex internal and customer facing security and support functions.
Manages high level projects that drive current security initiatives and support the security solutions.
Follows up on security findings from security-related reviews and other third-party reviews.
Equal Employment Opportunity
Applicants for U.S. based positions with Jack Henry & Associates must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire. Visa sponsorship is not available for this position.
Jack Henry & Associates, Inc. is an Equal Employment Opportunity/Affirmative Action Employer and maintains a Drug-Free Workplace.
EOE-M/F/Vet/Disability
DECIND1234
REQNUMBER: 9705-1CEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.