2017-01-06

If this job is assigned to any Government Business Division entity, the applicant and incumbent fall under a 'sensitive position' work designation and may be subject to additional requirements beyond those associates outside Government Business Divisions. Requirements include but are not limited to more stringent and frequent background checks and/or government clearances, segregation of duties principles, role specific training, monitoring of daily job functions, and sensitive data handling instructions. Associates in these jobs must follow the specific policies, procedures, guidelines, etc. as stated by the Government Business Division in which they are employed.Maintains enterprise information security policies, technical standards, guidelines, procedures, and other elements of an infrastructure necessary to support information security in compliance with established company policies, regulatory requirements, and generally accepted information security controls. Responsible for the delivery of strategic network security, access control and secure transaction/messaging solutions. Ensures security solutions involving the use of technologies are well-conceived, designed and implemented in compliance with enterprise standards. Primary duties may include, but are not limited to: provides first level engineering design functions and trouble resolution; provides trouble resolution and serves as point of technical escalation on complex problems; leads or plans implementations for access management and network security technologies; develops testing plans to ensure quality of implementation; leads the investigation and reporting of data security events and incidents; provides system and network architecture support for information and network security technologies; provides technical support to business and technology associates in risk assessments and implementation of appropriate information security procedures, standards and technologies; maintains security incident response plans; represents major upgrades and business system replacements in change control; oversees Enterprise mix of vendor services; recommends changes and updates to strategy; may act a key contact for setting vendor strategy; designs & engineers repetitive technical solutions based on business requirements and defined technology standards; develops support procedures and performance metrics reports; leads level 1 & 2 incident recoveries; may organize the efforts of other analysts as part of incident recovery; leads root cause analysis efforts.

Must be capable of providing top-tier support for 4 or more of the information security technology common body of knowledge skill sets: 1) Access Control, 2) Application Security, 3) Business Continuity and Disaster Recovery Planning, 4) Cryptography, 5) Information Security and Risk Management 6) Legal, Regulations, 7) Compliance and Investigations, 8) Operations Security, 9) Physical (Environmental) Security, 10) Security Architecture and Design, 11) Telecommunications and Network Security. Requires BS/BA Degree; 5 - 8 years experience in a support & operations or design & engineering role in any of the following areas: access management or network security technologies, servers, networks, telecommunications, operating systems, middleware, disaster recovery, collaboration technologies, or hardware/software support; or any combination of education and experience, which would provide an equivalent background. Significant experience with multiple technical and business disciplines preferred. Working knowledge and understanding of industry-accepted data processing controls and concepts as applied to hardware, software, data, network communications, and people. Security Certifications: CISSP preferred or other technical security certifications (e.g. Systems Security Certified Practitioner, Certification and Accreditation Professional).

EOE.M/F/Disability/Veteran

**Job** *Information Technology*

**Title:** *Info Security Advisor*

**Location:** *MN-Eagan*

**Requisition ID:** *123870*

Show more