Information Security Engineer improving and maintaining security infrastructure while adhering to Church policy. Works on compliance, risk assessments, and security monitoring initiatives.
Responsibilities
The Information Security Engineer 2 is an intermediate level professional role that functions as an oversight engineer for the organization.
This role works to improve and maintain security infrastructure while adhering to Church policy.
This position may work on initiatives involving internal and external compliance, risk, vulnerability and threat monitoring and assessments.
This position works under moderate supervision.
This role ensures that information security controls are properly implemented, monitored and maintained to protect organizational data and systems.
This individual assists the business in defining objectives, processes and measurements.
This is an individual contributor role.
Requirements
Bachelor’s degree in related field or equivalent professional experience
Two years of related experience (can be an internship in Information Security, IT and/or Computer Science including expertise in one or more of the following areas:
Security, privacy, business continuity, compliance or related area(s), attacker tactics for both enterprise and web systems, cyber threat intelligence, incident handling, continuous monitoring, intrusion detection, advanced network forensics, host forensics, SIEM, SOC processes, and malware analysis
Proven ability to assist with the design and implementation of security controls that meet business operational needs
Ability to successfully collaborate with a team
Familiarity with programming and scripting
Good professional written and oral communication skills
This job operates in a professional office environment
To successfully perform the essential functions of the job there may be physical requirements which need to be met such as sitting for long periods of time and using computer monitors/equipment
Preferred:
Relevant security certification from one or more of the following or equivalent certifying authorities: GIAC, CompTIA, ISC2, EC-Council, etc.
Benefits
Only members of the Church who are worthy of a temple recommend qualify for employment.
The Church will make reasonable accommodations for qualified individuals with known disabilities.
Senior Consultant focused on ISMS, BCM, and cybersecurity compliance at VICCON GmbH. Leading projects and collaborating with clients to enhance their information security and resilience.
GSS Officer at Itad supporting safety, security, and travel policies. Overseeing risk management and collaborating with project teams for operational support.
Install and manage fall protection systems at height, ensuring compliance with safety standards. Leadership required in overseeing teams and project delivery at construction sites.
Security Design Lead in Rabobank's cybersecurity team, designing secure technology solutions for food & agribusiness banking. Collaborating across teams to ensure robust security implementations.
Identity Security Posture Management Specialist enhancing identity security posture at Kemper Insurance. Collaborates across teams to tackle identity risks and compliance challenges in a high - performing culture.
Principal Architect developing cybersecurity strategy for Ensemble's technology - enabled revenue cycle management solutions. Focus on securing cloud architectures and ensuring information assurance in healthcare.
Senior Manager overseeing Security Risk Management at First American. Leading enterprise policies, third - party vendor security, and security strategy execution.
Zscaler Engineer responsible for maintaining cybersecurity tools and developing integrations at HP. Collaborating across teams to enhance data loss prevention strategies and monitor industry threats.
Designer developing comprehensive application solutions for security systems at Johnson Controls. Collaborating on technical sales support and large - scale integrated electronic security systems.
Analyst role supporting Epic Security & Configuration at Acrisure, ensuring application functionality and troubleshooting issues. Collaborating with teams for configuration and security in Applied Epic systems.