Bachelor’s degree, or equivalent education/work experience, in Information Technology, Accounting/Business or Auditing. Professional/Technical certification(s) such as CCNA or better, CISA, CISM, or CISSP, CEH, GCIH considered a plus.
The successful candidate is an information security professional with a minimum of 2 years of experience administering and implementing perimeter defense technologies (including firewalls, proxy servers, and remote access), with a solid understanding of networking and application security tools and protocols. He/She must possess a strong knowledge of configuration management, controls, and compliance.
The successful candidate must be a pro-active thought leader and possess the ability to establish, maintain and influence effective working relationships with colleagues and internal customers. He/She is results-oriented with a track record for leadership and self-directing. He/she must be able provide accurate analyses and appropriate security management action plans.