Your dream job is just a click away

2020.07.09. | Budapest

External Connectivity Security (ECS)

Introduction

The External Connectivity Security Analyst is an intermediate level position responsible for leading efforts to prevent, monitor and respond to information/data breaches and cyber-attacks. The overall objective of this role is to ensure the execution of Information Security directives and activities in alignment with our partner's data security policy. Interface with Global Markets Trading business and application teams, understand functional business and connectivity requirements, translate the business/application connectivity requirements into actionable change requests to be implemented by network engineering, firewall & proxy operations, Load Balancer operations and System Administrators

Tasks
  • Assist Security Incident Response Teams with incident investigations and aid in technical risk assessments
  • Coordinate with system development and infrastructure units to identify Information Security (IS) risks and the appropriate controls for development, day-to-day operation, and emerging technologies
  • Perform regular assessments based on changes in the threat landscape
  • Monitor vulnerability assessments and ethical hacks, ensuring that issues are addressed for the applications that they support
  • Provide information security support with related activities during systems development (e.g. authentication, encryption)
  • Identify and develop new and improved technical procedures and process control manuals
  • Identify significant IS threats and vulnerabilities
  • Assume informal/formal mentorship role within teams and assist with the coaching and training of new team members
  • Appropriately assess risk when business decisions are made, demonstrating particular consideration for the firm's reputation and safeguarding our partner, its clients and assets, by driving compliance with applicable laws, rules and regulations, adhering to Policy, applying sound ethical judgment regarding personal behavior, conduct and business practices, and escalating, managing and reporting control issues with transparency

Expectations
  • 5-8 years of relevant experience
  • Consistently demonstrates clear and concise written and verbal communication
  • Proven influencing and relationship management skills
  • Proven analytical skills

  • Process Firewall, Proxy, SEC ACL, ILLUMIO, Linux & Unix Server network connectivity and RAS connectivity requests and perform risk assessments to ensure that the connectivity is compliant with Our partner's Information Security Standards and IS Policies.
  • Provide Information Security oversight and guidance to our partner's businesses requiring Third party connectivity as it relates to our partner's Information Security Standards and IS Policies.
  • Liaise with multiple technology teams (i.e. CATE Network Engineering; Proxy OPs and Integration; Perimeter Security Ops; System Based Computing; Remote Access Services and Business Information Security Officers); to facilitate cross-functional solutions as it relates to Third party connectivity aligning with Our partner Information Security Standards. Modality solutions include (but not limited to) RAS, B2B, Firewall, Proxy, SEC ACL, illumio, and 3rd Party Architecture (TPA) solutions.
  • Test and pilot system enhancements/changes and/or other products such as: our partner's Connectivity Registry (CCR), CMP and Resolve-IT as it relates to ECS functionality
  • Appropriately assess risk when business decisions are made, demonstrating particular consideration for the firm's reputation and safeguarding Our Partner, its clients and assets, by driving compliance with applicable laws, rules and regulations, adhering to Policy, applying sound ethical judgment regarding personal behavior, conduct and business practices, and escalating and reporting control issues with transparency.

    Key Skills

  • CCNA Certification or associated experience
  • Comprehensive understanding of Information Security, CISSP
  • Firewall Administration 2 –5 years
  • Application Filtering
  • TCP/IP Protocols
  • IPSEC/GRE/GETVPN
  • Network Administration 2 – 5 years
  • Routing Configuration
  • Access Control Lists
  • TCP/IP Protocols and Ports
  • Multicast & Unicast
  • IPSEC/GRE/GETVPN
  • Encryption 2 -5 years
  • Encryption Algorithms
  • Hardware Encryption (Encryptors/IPSEC/GRE/GETVPN)
  • Software Encryption (NDM/SFTP/Application)