ACCOUNTABILITIES & ESSENTIAL FUNCTIONS
- Evaluates systems, workflows, methodologies, source code, and configurations against appropriate information security standards and provides reports to document
- Works to ensure confidentiality, integrity, and availability of Mouser systems.
- Develops, deploys and maintains information security related tools and systems in support of information security operations
- Maintains strict confidentiality of all sensitive or confidential information
- Must stay up to date on current security, operating system and web technologies.
- Mentors and trains both technical and non-technical audiences on security practices and standards
- Ability to effectively communicate both verbal and written technical and non-technical communication. Uses good business judgment and communications to keep IS Management informed.
- A positive attitude, good teamwork, professionalism & interpersonal skills, proactively seeking solutions, taking initiative where necessary.
Other duties as required.
SKILLS & CERTIFICATIONS
- Skill evaluation: Behavioral (80%)
Thorough knowledge of:
- OWASP Top 10 and relevant mitigations
- Common infrastructure systems and associated security controls
- Network security including Firewalls and VPN
- PKI and Multifactor Authentication
- SAML and/or oAuth, Authentication, Authorization, and Accounting
- Web based APIs and automation systems
- Encryption and key management
- Programming languages and secure application development
- Database operations and security controls
- Risk based assessment and Risk management methodologies
- Compliance frameworks (NIST, PCI, SOX, ISO, GDPR, etc)
- Relevant information security certification
- Strong analytical and problem-solving skills
- Strong team-oriented interpersonal and communication skills
Self-starter and finds issues and opportunities and makes recommendations to management.
EDUCATION & EXPERIENCE
- Bachelor’s degree or equivalent experience and at least 5 years’ experience in Information Security making use of most of the security standards, languages, tools, and applications listed in the “Skills” section of this document