The job below is no longer available.

You might also like

in Austin, TX

Use left and right arrow keys to navigate
Hours Full-time, Part-time
Location Austin, TX
Austin, Texas

About this job

'Want to know what it's like to work in IT at The Home Depot?'
https://vimeo.com/70037824

POSITION PURPOSE
-
This position interacts with all levels of IT to manage compliance with PCI standards. This may involve working with other IT security professionals to drive enhancements to processes, procedures and technology. This position is heavily engaged during annual assessments and serves as a focal point for driving the collection of data in support of PCI controls.

The Lead Security Engineer utilizes solid business knowledge and expert technical experience of security to provide a secure information environment for the business. Assists in the investigations of high level, complex violations of Information Security Policies by analyzing forensic data from Sr. Analyst. Develop recommendations and take appropriate action. Develop and drive the Disaster Recovery and Business Continuity strategy. The purpose of the position is to provide effective Information Security services that: Continuously protect our critical information assets and brand name. Assure compliance with corporate and regulatory policies/standards & industry best practices. Simplify, enhance and enable business initiatives. Operates as a team lead providing technical direction to team members. May perform the function to automate access provisioning across supported systems and applications with documentation. May direct, define and provide audit reporting.

MAJOR TASKS, RESPONSIBILITIES AND KEY ACCOUNTABILITIES -
Lead investigation of high level complex violations of Information Security Policies and direct activity to analyze forensic data from Sr. Analysts. Develop recommendations and take appropriate action.

Present to Information Technology management development/implementation plan for secure solutions.

Present findings to manager on compliance reporting for Information Securities Policies.

Drive the Disaster Recovery and Business Continuity strategy.

Provide technical direction to analysts, associates and contractors.

Develop Information Security Policies, Standards and Guidelines.

Automate access provisioning across supported systems and applications with documentation. Direct, define and provide audit reporting.

NATURE AND SCOPE -
Typically reports to Manager, Information Technology

No associates report to this role on a permanent basis, but requires the leadership of a work group: assign and review work, train and contribute to performance appraisal (but not hiring, firing or disciplinary action).

ENVIRONMENTAL JOB REQUIREMENTS -
Located in a comfortable indoor area. Any unpleasant conditions would be infrequent and not objectionable.

Typically requires overnight travel less than 10% of the time.MINIMUM QUALIFICATIONS -
Must be eighteen years of age or older.
Must pass the Drug Test.
Must successfully complete any required training or orientation courses.

EDUCATION REQUIRED -
The knowledge, skills and abilities typically acquired through the completion of a high school diplomas and/or GED.

YEARS OF RELEVANT WORK EXPERIENCE - 5

PHYSICAL JOB REQUIREMENTS -
Most of the time is spent sitting in a comfortable position and there is frequent opportunity to move about. On rare occasions there may be a need to move or lift light articles.

ADDITIONAL QUALIFICATIONS -
Direct hands-on experience with one or more of the following InfoSec solutions: Anti-Virus, intrusion detection, firewalls, content filtering, rick assessment.

PREFERRED QUALIFICATIONS -
Candidates must have IT Compliance experience working with technology teams, internal audit and external PCI assessors Excellent written and verbal skills are a must-have
Strong organization and time management skills along with great people skills will ensure the candidate is able to drive toward and meet tight deadslines
Carrying a current ISA, QSA, or PCIP certification is a plus

KNOWLEDGE, SKILLS, ABILITIES AND COMPETENCIES
-
Assessment tools, technologies and methods.

Designing secure network, systems and application architectures.

Disaster recovery, computer forensic tools, technologies and methods.

Planning, researching and developing security policies, standards and procedures.

System administration role with experience in supporting multiple platforms/applications.