Loading...

IS Security & Operations Engineering - 2

Date: Mar 31, 2021

Location: Home Office/Remote, -, US

Company: Aptar Group

Position:                               IS Security & Operations Engineering

Reports To:                            Manager, IS Security & Operations Engineering

Location:                               Remote position near any Aptar facility globally 

 

Primary Purpose Summary

This position has ownership and responsibilities in both security and operational functions within the IS Engineering group. This is a cross-functional role that combines core

infrastructure elements with a primary focus on security platforms to ensure that Aptar's critical assets and data are protected at all times.

 

The goal of the security function is in protecting the organization, work with the Architecture team to define global solutions, design system security and administration policies, initiate mitigation projects, and monitor mitigation progress and the overall security state of the environment. The security and operational role will also include a focus on continuous improvement of existing services and introduce automation/orchestration to maintain a stable, scalable and highly resilient operating environment that can support the current and future business needs of Aptar.

 

Job Responsibilities:

  • Responsible to maintain platforms that provide services across all Aptar locations 
  • Continuous Service Improvement 
  • Contract management with external vendors  
  • Create maintain and Review SOPs, SWI’s and KB articles 
  • Manage the relationship with other groups and define the delegation part of the Service (hands on work) 
  • Assess product architecture and layout design in a cloud / on-premise environment against industry best practice 
  • Configuration management, task management, aptitude for automation,  
  • Develop implementation architecture, solution documentation and standards to be shared with the IS organization 
  • Work with IS Security and Infrastructure/Operations Architects to develop technology roadmaps 
  • Work with development/delivery teams to create robust/scalable solution to support our growing applications 
  • Manage Proof of concepts and other testing and make sure it is according to our budget and addresses other requirements (business or technology-driven) 
  • Installing, implementing, administering, and maintaining security architecture technology processes and platforms including: network access control, vulnerability management, anti-malware, intrusion detection, public key management, certificate management, physical security management, and identity & password management solutions.
  • Maintain logging and monitoring solutions for security and information event management.
  • Administer, manage, and use system and applications vulnerability scanning tools.
  • Investigate and respond to security events and potential incidents in accordance with prescribed procedures.
  • Keeping abreast of the latest security issues and emerging threats including both general threats and those specifically targeting the manufacturing industry.
  • Coordinate activities for the Security Virtual Team member
  • M&A Security Assessments
  • Manage an Application Security Program that documents and evaluates the security of Aptar’s application.  Works with application owners to apply security best practices.
  • Manage SAP vulnerability management and work with the basis team to remediate all issues.

 

Skills (Hard skills)

  • Able to turn manual processes into automated scripts using PowerShell, python, java, or similar languages.
  • Experience with the following operational platforms and technologies:
  • Cloud Security tools and SaaS offering
  • Network access control (Forescout)
  • Vulnerability management and tools such as TenableIO and WSUS
  • Security assessment tools such as Burpsuite, Kali Linux, Nessus Pro
  • End Point Protection and tools such as Umbrella, SentinalOne, Netskope
  • Powershell scripting for automation and log extraction

 

  • Demonstrate skills in digital investigations including: computer forensics, network forensics, malware analysis and memory analysis.
  • Strong understanding of networking protocols and basic networking concepts.
  • Experience in security or network technology (Windows/Linux OS, Cisco Routing-Switching) within a hands-on design/Implementation/Administration role is required.
  • Experience with security incident management, malware management and vulnerability management processes.
  • Security monitoring experience with one or more SIEM technologies - ELK, IBM QRadar, LogRhythm, Splunk.

Competencies (Soft skills)

  • Strong analytical and problem solving skills to troubleshoot and resolve network/operating system security issues
  • Ability to administer the operations of a security infrastructure
  • Ability to balance and prioritize work
  • Strong communication and interpersonal skills
  • Good English written/spoken
  • Demonstrated track record as a team player
  • Ability to work independently on initiatives with little oversight. Motivated and willing to learn

Education

  • Bachelor Degree in Cybersecurity, Computer Science, Information Systems, Information Security & Assurance, Information Technology, or related field required.
  • Have at least 5 years’ experience working in a global enterprise environment with design responsibilities
  • Any system, networks, or cybersecurity related certifications are a plus. Obtaining specific certifications is expected as part of career development