Information Systems Security Lead

To apply, email your résumé to:
resume@children.org

Reports to: VP of IT
About Children International

Children International is a nonprofit humanitarian organization working to eradicate poverty around the world. At CI, we believe that ending poverty starts with children. Without help, children in poverty become adults in poverty. Our vision is to bring people together to put an end to that through programs focused on health, education, empowerment through life skills and, ultimately, employment. Ours is a unique, long-term, customized approach that allows us to stay with our children for the first two decades of their lives. We’re in it for the long haul because we know that the 200,000 children we support in 10 countries around the world deserve a fighting chance.

Children International’s work is made possible by generous and caring sponsors, donors, corporations, more than 9,000 dedicated volunteers and approximately 1,600 employees. To ensure our programs give children the best possible chance of breaking the poverty cycle, we are elevating our practices for growing our people talent worldwide. That’s where you come in.

Position summary

We are expanding our Information Technology staff in support of exciting new strategic initiatives here at Children International. We are looking for Information Systems Security Talent that can lead CI’s IT security posture, in collaboration with our diverse, talented team of IT professionals.

Responsibilities

  • Provide guidelines and controls to achieve a mature IT security posture at CI and its agencies, including but not limited to the adoption of an IT security/risk management framework.
  • Assist in the preparation and review of documentation to include in System Security Plans and Risk Assessment Reports.
  • Collaborate in the implementation and maintenance of secure disaster recovery and monitoring solutions.
  • Use data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs, monitors, etc.) to analyze events that occur within our hybrid (public and private cloud) infrastructure for the purposes of mitigating and preventing threats.
  • Identify, analyze, and report events that occur or might occur within our hybrid infrastructure to protect information, information systems, and networks from threats.
  • Conduct independent comprehensive assessments of the management, operational, and technical security controls and security enhancements employed within applications and network infrastructure to determine the overall effectiveness of the controls.
  • Assess the security impact of new enterprise IT solutions or potential changes in the IT infrastructure and propose changes that may improve security.
  • Collaborate with others to ensure timely configuration and deployment of deliverables.
  • Constantly update job knowledge by participating in educational opportunities and reading professional publications.
  • Other IT related responsibilities added by the supervisor.
REQUIRED CHARACTERISTICS & QUALIFICATIONS
  • Computer Science degree or 5+ years equivalent job experience.
  • 3+ years of experience implementing, managing, and monitoring Information Systems Security on a Microsoft hybrid (private and public cloud) network environment.
  • Active Directory, Azure AD and Office 365 Security.
  • Computer networking concepts and protocols, and network security methodologies.
  • Risk management framework (RMF) requirements and processes (e.g. methods for assessing and mitigating risks on a network environment).
  • Authentication, authorization, and access control methods.
  • Capabilities and applications of network equipment including routers, switches, bridges, servers, transmission media, and related hardware.
  • Cyber defense and vulnerability assessment tools and their capabilities.
  • Encryption algorithms.
  • Business continuity and disaster recovery plans.
  • Vulnerability information dissemination sources.
  • IT security principles and methods (e.g., firewalls, demilitarized zones, encryption, two factor authentications, etc.)
  • Network and application security threats and vulnerabilities (e.g. buffer overflow, cross-site scripting, DoS, Procedural Language/Structured Query Language [PL/SQL] and injections, malicious code, etc.).
  • Network security architecture concepts including topology, protocols, and components.
  • Incident response and handling methodologies.
  • Intrusion detection methodologies and techniques for detecting host and network-based intrusions.
  • Key concepts in security management (e.g. Release Management, Patch Management).
  • Cyber defense and information security policies, procedures, and regulations (e.g. PCI, HIPPA, GDPR, PII Protection, etc.).
  • Network and operating system hardening techniques.
  • Cyber-attack stages (e.g. reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.
  • Knowledge of network protocols such as TCP/IP, Domain Name System (DNS), and directory services.

This site uses cookies to improve your experience. You can restrict cookies through your browser; however that may impair site functionality.

GOT IT