SENIOR SECURITY ENGINEER - REMOTE

Location US-NJ-CAMDEN
Job ID
62891
Category
Professionals
Shift
1
Type
Full Time
Department Name
IT Technology Security

About Us

At Cooper University Health Care, our commitment to providing extraordinary health care begins with our team. Our extraordinary professionals are continuously discovering clinical innovations and enhanced access to the most up-to-date facilities, equipment, technologies and research protocols. We have a commitment to its employees by providing competitive rates and compensation, a comprehensive employee benefits programs, attractive working conditions, and the chance to build and explore a career opportunity by offering professional development.

 

Discover why Cooper University Health Care is the employer of choice in South Jersey.

Short Description

The Senior Security Engineer works closely with business and IT to determine business process and productivity needs and develop the necessary cybersecurity strategy to support the business goals. The Senior Security Engineer will support technical needs, requirements, and the state of the network’s infrastructure design, integration, and operations. Work with technical management to optimize cybersecurity that effectively reflect business needs, service-level and availability requirements, and other technology parameters. Support design principles for the security of the physical network perimeter and internal protection of the organization’s network. Support and develop models, plans, internal standards, budgets, and processes based on industry best practices. Support governing principles for network design and deployment. Participate in selection of cybersecurity technologies and products for implementation and use.

 

Assists in strategic planning through continued understanding of Cooper’s business strategy, our current technology and cybersecurity portfolio, and technology and cybersecurity trends to optimize cybersecurity solutions that effectively reflect business needs, service-level and availability requirements, and other technology parameters.
Assists in the strategic design and architecture of a complex, high-scale enterprise security program that protects all levels of the OSI model..
Recommends, develops, implements and maintains solutions for responding to threats, including planning, communication, analysis, mitigation, and continuous improvement.
Recommends, develops, implements and maintains solutions for detecting risks and potential breaches to Cooper’s environment including continuous security monitoring, detection procedures, event monitoring and log management.
Analyze and review designated business solutions to ensure they are in compliance with Cooper’s cybersecurity controls.
Serves as the subject matter expert for cybersecurity approaches, procedures and implementation of business requirements. Provides analysis of and suggested solutions to proposed implementations.
Participates as a senior member of Cooper’s cybersecurity incident response plan
Facilitates the cybersecurity risk assessment with focus on identifying vulnerabilities utilizing different assessment techniques. Develops risk mitigation plans to address results of security audits, reviews and scans.
Assists with the decommissioning or migration of existing environments.
Develop and maintain up to date documentation relating to information security, e.g., playbooks, policies, procedures, etc.

Experience Required

6-10 years experience required

Education Requirements

Bachelor's degree in IT or equivalent work experience

License/Certification Requirements

CISSP, CRISC, or one of the GIAC certifications or equivalent work experience required

Knowledge of the NIST Cybersecurity Framework

Special Requirements

Scheduled Days / Hours: M-F; License (or Certification):CCDP Preferred; License (or Certification):CCNP Preferred; License (or Certification):EQUIV Preferred

Required:

Practical work experience in implementing cybersecurity solutions

Knowledge of the current threat landscape, including common attack types and mitigation steps.

Solid understanding of cybersecurity policies, standards and industry leading practices

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed