IT Security Engineer
Job Description
Job Description
Responsibilities
Works independently on multiple IT projects as a project team member, occasionally as
a project leader.
Works on moderately-complex to complex system issues or projects that require
increased skill in multiple IT functional areas.
May coach more junior staff.
Ensure release management and SDLC processes are followed
Communicate verbally and in writing to technical and non-technical audiences of various
levels both internally and externally
Develop partnership-oriented relationships with business executives and functional
leaders, especially as it relates to operations and technology
Multitask in a fast-paced environment with a focus on timeliness, documentation, and
communications with peers and business users
Develops and manages IT systems for business units across the enterprise.
Develops and implements strategies to follow IT policies and procedures
Prepares status reports on related IT functions and related projects to ensure
management is appraised of current workload.
Involved in the evaluation of products and/or procedures to enhance productivity and
effectiveness.
Provides direct support to the business and IT staff.
Gather and document requirements from relevant business owners
Create and maintain documentation of system components and their operation
Write unit and integration tests that ensure system reliability
Help train end-users on the use of any new tooling
Take ownership of tools and sub-components
Properly support and manage user access and passwords per IT policies and
procedures
Proposes and implements systems enhancements that will improve the reliability and
performance of the system.
Monitors usage and performance.
Installs, maintains, and upgrades internal server hardware and software systems used
for designing and developing company products.
Troubleshoots server, software, and hardware issues.
Assists with recommending, scheduling, and implementing system hardware and/or
software upgrades or repairs.
Researches, evaluates, and recommends software and hardware products.
Maintain a secure systems environment.
Provides new hardware specifications based on application needs and anticipated
growth.
Performs other related duties as assigned.
Knowledge and Experience
Bachelor's degree in Computer Science, Information Systems, or an equivalent
combination of education, training, or work experience
Knowledge of relevant IT system issues, techniques, and implications across more than
one server platform.
Must have extensive knowledge in networking, databases, systems, and/or Web
operations with a primary focus on IT system administration, IT application
administration but may be involved in developing enterprise IT strategies, management
of projects and more complicated issues.
Typically requires four (4) or more years of combined IT and Identity Access
Management work experience with a broad range of exposure to systems analysis,
applications development, along with infrastructure design and administration with at
least two (2) years of experience in the IT Engineering role.
Professional certification such as CISSP, CISM, etc. is strongly preferred.
Preferred
Knowledge of ICE business environment and the ability to evaluate implications of
changes to IT systems
Knowledge of relevant legal and regulatory requirements
Knowledge of common Identity Access Management frameworks
Experience working with a diverse range of data sources/streams and managing these
effectively
Excellent analytical, decision-making, and problem-solving skills
Knowledge of multiple operating systems and related utilities and hardware
Knowledge of storage management, TCP/IP, and network monitoring and tools
Knowledge of Database design and Running SQL commands
Knowledge or Hands on Experience writing and running scripts.
Knowledge of technical writing principles and practices
Skill to effectively analyze and solve problems
Skill in software installation and maintenance
Ability to work independently as well as with a team
Ability to communicate effectively verbally and in writing
Ability to establish and maintain effective working relationships
Strong background in operations, processes, solutions, and technologies
Strong understanding of policy, compliance, and best practice Identity Access
Management principles
Working knowledge of Linux, Windows, and Network Operating Systems
Knowledge of infrastructure, key processes, and technology-oriented risk issues,
specifically around Identity Access Management and privacy
Experience with enterprise risk assessment methodologies
Proficiency in project management
Results oriented, business focused, and successful at interfacing across multiple
organizational units
Experience with SaaS Solutions and Vendor Mgmt. (i.e. Vendor Ticketing Support and
Escalations)