POSITION SUMMARY: Monitors, evaluates, and maintains systems and procedures to protect the data systems and databases from unauthorized users. Identifies potential threats and responds to reported security violations. RESPONSIBILTIES: Establishes security perimeters, firewalls, intrusion detection and prevention systems, virus protection and detection systems, and endpoint security. Installs, configures, maintains, and documents network hardware and software information security products at multiple sites as required to implement projects. Completes the various reports and completes the forms required to capture the security related status of a system. Responds to security incidents and events by assisting in conducting investigations and generating final reports. Conducts internal and external network security scans and assessments; performs manual penetration testing and documents test results. Works with application development teams and releases engineering teams to integrate strong security controls into software development lifecycle. Makes changes to firewall rule sets. Monitors security websites, vendor alert mailing lists, and other information channels to evaluate emerging exploits. Works with Operations team to schedule patching or other remediation efforts. Evaluates and assesses compliance with established information assurance policies and regulations. Conducts and documents risk and threat assessments. Implements test plans and vulnerability reports. Keeps abreast of emerging security technologies and make appropriate recommendations regarding their implementation. Performs a series of technical assessments and tests, including penetration testing, with multiple security tools on networks, communication systems, applications, operating systems, servers, personal computers, and other IT related peripherals, devices or software for technical vulnerability and risk assessment. Participates in projects as technical expert to ensure timely implementation or delivery of critical information security infrastructure. Communicates both verbally and in writing in a professional manner. Assists in educating users on security procedures. EDUCATION & EXPERIENCE: - Typically requires bachelor‘s degree or equivalent and two to four years of related experience. - Security+ Required PHYSICAL DEMANDS: Normal demands associated with an office environment. Ability to work on computer for long periods, and communicate with individuals by telephone, email and face to face. Some travel may be required.