Teledyne Technologies

Information Security Administrator

Job Locations US-CA-El Segundo | US-CA-Rancho Cordova | US-AL-Huntsville
Requisition ID
2018-6251
Company Name
Teledyne Technologies Incorporated
Shift
1st Shift - Day
Citizenship/Visa Requirement
US Citizen Only
Internal Code (for CareerBuilder)
#CB#

Company Overview

Teledyne is an Equal Opportunity/Affirmative Action employer.  All qualified applicants will receive consideration for employment without regard to race, color, religion, religious creed, gender, sexual orientation, gender identity, gender expression, transgender, pregnancy, marital status, national origin, ancestry, citizenship status, age, disability, protected Veteran Status, genetics or any other characteristic protected by applicable federal, state, or local law.    

If you need assistance or an accommodation while seeking employment, please email  teledynerecruitment@teledyne.com or call (805)373-4545.  Determinations on requests for reasonable accommodation will be made on a case-by-case basis.  Please note that only those inquiries concerning a request for reasonable accommodation will receive a response.  

Position Summary and Responsibilities

The Information Security Administrator is a member of the team responsible for ensuring the safety of the Teledyne information assets and infrastructure, and protecting Teledyne systems from loss of confidentiality, integrity, or availability.

 

Essential Duties and Responsibilities

  • SIEM (security information and event management) – responsible for real-time monitoring and health assessment, researching and answering alerts related to the tool. Maintains access to the SIEM tool, adding and deleting system feeds, and user access to viewing and reporting as needed. Works with the vendor for timely maintenance, updates and upgrades. Responsible for keeping data sources current and load balancing.
  • Phishing – responsible for answering employee questions regarding potential phishing attempts and emails, with particular emphasis on queries from home-base time zones
  • Indicators of Compromise (IOCs) – maintains the library of IOCs, notifies other functional IT groups of new IOCs, updates necessary systems, and tracks scorecard changes
  • Researches and reviews software approval requests to ensure security standards are met
  • Responds to cybersecurity related Help Desk requests including, but not limited to: phishing, URL access, software approval/checkout/installs, file downloads, TrendMicro alerts, Firewall IP/Ports, Bit9 blocking, and browser certificate errors
  • Research attempted or successful efforts to compromise systems security and designs countermeasures
  • Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information and systems
  • Manages and partners with third party information security vendors
  • Communicates security risks and solutions to business partners and IT staff as needed
  • Participates in delivery of annual Information Security training/fairs
  • Attends cybersecurity events and participates in other external cybersecurity activities to stay current in the field
  • Responds to emergencies and helps remediate information security incidents
  • Daily availability to include evenings and weekends when necessary to reach goals and deadlines

Qualifications

To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

 

Education and/or Experience:

  • Bachelor's degree (B.S.) from four-year college or university in a related field and 5-10 years of information technology experience with a cybersecurity focus and/or training; or equivalent combination of education and experience
  • Professional certification(s) such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or similar
  • Knowledge of regulatory requirements related to privacy and information security
  • Ability to learn and adapt to new technologies

  • Full knowledge and thorough understanding of:

    • Automated vulnerability scanning tools, forensic tools, Windows and other operating systems
    • Information security architecture, systems design, integration of systems and networking
    • Latest information security technologies and tools, including tools for maintaining, assessing and evaluating security, and conducting security incident forensic work
    • IT System Administration experience – build servers, administer a system

     

    • Microsoft Office Suite (i.e., Outlook, Word, Access, Excel, PowerPoint, Project, Visio, etc.)
    • Support ticketing systems, change control methodologies and their importance to ITIL best practices

Requisition Post Information* : Posted Date

2/15/2018

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed