Senior Cyber Security Engineer
Atlanta, GA, US, 30328
Full Time Senior-level / Expert USD 93K - 124K
Graphic Packaging International, LLC
Graphic Packaging is a leader in consumer packaging solutions including folding cartons, cups, foodservice packaging, cooking solutions and multipack machinery.If you are a GPI employee, please click the Employee Login before applying.
At Graphic Packaging International, we produce the paper cup that held your coffee this morning, the basket that transported those bottles of craft beer you enjoyed last weekend, and the microwave tray that heated your gourmet meal last night. We’re one of the largest manufacturers of paperboard and paper-based packaging for some of the world’s most recognized brands of food, beverage, foodservice, household, personal care and pet products. Headquartered in Atlanta, Georgia, we are collaborative, diverse, innovative individuals who create inspired packaging while giving back to our communities.
With over 25,000 employees working in more than 130 locations worldwide, we strive to be environmentally responsible in our industry and in the communities where we operate. We are committed to workplace diversity and offer compensation and benefits programs that are among the industry’s best to reward the talented people who make our company successful.
If this sounds like something you would like to be a part of, we’d love to hear from you.
A World of Difference. Made Possible.
MISSION / SUMMARY:
Reporting to the Chief Information Security Officer or Director, the Sr. Cyber Security Engineer will be responsible for
- The day-to-day hands-on configuration of safe and secure operating environment for GPI; and leading the engineering of the IT/OT infrastructure with focus on network access control, OT vulnerabilities, and supporting Forescout platform) with our third-party managed service providers and respective professional service teams and implementing security solutions to assist businesses with the assessment and improvement of GPI’s security infrastructure. Cross train on other cyber security solutions as a secondary function.
JOB FUNCTIONS: Job functions include but are not limited to the following.
- Advise senior management by identifying critical security issues; recommending risk-reduction solutions.
- Partner with various internal company departments to provide internal security consulting for various corporate initiatives.
- Conduct forensic analysis of corporate assets to provide Management, Human Resources, Legal, or others (as approved) with requested information to address business continuance and/or litigation needs.
- Responsible for mid complexity to high complexity cyber security technology implementations
- Manage continuous improvement process of security operations
- Act as the single point of accountability across Global IT for security
- Provide the policies and processes across Global IT for Information Security
- Responsible for security monitoring metrics and trending for actionable patterns including pushing knowledge base articles to the Global Help Desk to allow remote incident remediation where applicable
- Drive process improvement to continually improve service and reduce costs
- Collaborate with engineering management teams to ensure proper deployment and monitoring of new security technologies and cloud enablement as GPI continues to evolve in that space
- Extend current security operations management governance model to a global footprint in partnership with other IT leaders in the organization.
- Perform root cause analysis, future prevention / risk mitigation on critical security incidents
- Engage third level support and vendor system engineers as necessary to participate in problem response and root cause determination of security incidents
- Work with the compliance team and vendors to ensure SOX evidence for internal & external audit.
- Ensure regulatory compliance with regional, national & international data privacy regulations
- Provide guidance to development teams to ensure the appropriate level of secure code scans are performed prior to implementing code into the production environment.
- Advanced technical knowledge across cyber security technologies inclusive to Network Access Control, Endpoint and Cloud Security, Identity and Privilege Management.
BACKGROUND / EDUCATION/ EXPERIENCE:
- Bachelor’s degree in computer science, information security or related field of study; or commensurate experience
- CISSP, GIAC, or CISM certifications are preferred
- 7+ years of experience in working across and in an IT Service organization
- Solid Information Security background, including information and cyber security assessment, risk analysis, privacy, data protection, regulatory frameworks, as well as risk and security architecture and demonstrated experience in leading cyber incident response
- Expertise in one or more of the following; Privilege Management, Vulnerability Management, Single Sign On, Identity Access management, Cloud and Network Security
- Strong knowledge of information security threats, vulnerability and countermeasures and associated operational best practices
- Ability to participate in multiple projects simultaneously that involve key stakeholders across a complex organization inclusive to Ide
- Strong communication skills with the next level of leadership
- Ability to work in a virtual team environment across global time zones
- Ability to pull and analyze data for helping drive continual operational improvement
Pay Range: $93,030.00 - $124,005.00
Graphic Packaging is an Equal Opportunity Employer. All candidates will be evaluated on the basis of their qualifications for the job in question. We do not base our employment decision on an employee's or applicant's race, color, religion, age, gender or sex (including pregnancy), national origin, ancestry, marital status, sexual orientation, gender identity, genetic identity, genetic information, disability, veteran/military status or any other basis prohibited by local, state, or federal law. Click here to view the Poster, EEO is the Law.
Tags: CISM CISO CISSP Cloud Compliance Computer Science GIAC Governance Incident response Monitoring Network security Privacy Risk analysis Security assessment SOX Vulnerabilities Vulnerability management
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.