Design, implement, and maintain both on-premises and cloud-based information system security controls and countermeasures, documenting their operation and expected outcomes
Analyze and recommend security controls and procedures throughout the acquisition, development, and change management lifecycle of information systems, ensuring compliance
Administer authentication and access controls, conduct regular reviews of exception reports, and take appropriate actions to uphold system integrity
Monitor information systems for security incidents and vulnerabilities, reporting findings and trends, and responding to incidents, including investigation and recovery
Collaborate with senior security engineers and stakeholders to maintain strategic roadmaps for the Information Security program, analyzing threat and compliance environments, and executing plans for risk mitigation
Develop and implement information security governance, including policies, procedures, standards, and guidelines, while also overseeing training and awareness programs
Maintain expertise through individual development plans and mentorship, while also advocating for C.H. Robinson's security controls and program
Provide support and documentation for vendor relationships
Other duties and responsibilities
Required Qualifications:
5+ years of Technology experience
3+ years of information security/identity access management experience
Demonstrated experience and progressive track record of technical achievement and a strong focus toward customer service and satisfaction
Strong Active Directory, Linux, and Windows client/server experience
Security technologies and implementation of security products (firewalls, AV systems, IDS, IPS, web content filter, Microsoft Windows system security services and functions)
Working knowledge of public cloud workloads and SaaS systems
Strong experience with identity and access management, Azure (MFA, identity lifecycle) tools and technologies
Understanding of best practices in security engineering, including secure development, cryptography, network security, security operations, systems security, policy, and/or incident response
Bachelor’s degree in computer science or minimum of 4 years of equivalent work experience and high school diploma/GED Preferred Qualifications:
Experience securing cloud workloads and SaaS systems
Securing public cloud workloads
Working knowledge and previous experience with forensic investigations
Working knowledge of PKI and certificate management
Experience with two factor authentication methods and technologies
Previous experience establishing and utilizing measurements, processes, and metrics to manage support activities
Experience with encryption technologies and methods
Previous experience with vendor management and coordinating vendor activities.
Knowledge of wireless technology and portable device security
Ability to perform technical analysis of complex software, systems, hardware, and network environments
CISSP, Cisco, Microsoft, or security certifications
Values a diverse and inclusive work environment
Proactive, accountable, autonomous, and solutions oriented
Strong time management and organizational skills
Ability to deliver to aggressive deadlines while working complex projects across multiple groups
Strong facilitation and communication skills, ability to coordinate and motivate resources