Cryptographic Engineer
Jacksonville, FL, United States
Fidelity National Financial
Overview
POSITION OVERVIEW
Fidelity National Financial (FNF) is seeking a Cryptographic Policy Engineer to join its Information Security Office (ISO). This position will be reporting to the Director of Cryptography. As a Cryptographic Policy Engineer, you will evangelize the Cryptographic Protections culture by partnering with Security Architects, Security Engineers, Program Managers, Infrastructure Engineers, and Developers to scale out and secure their service offerings. Providing adaptive guidance to encrypt the associated resources.
To be successful in this position, you will need a deep technical understanding of cloud environments, DevOps practices, and the ability to learn new information at a rapid pace. A strong track record in infrastructure as code and configuration management is critical, but the willingness and drive to improve our Cryptographic practices overall is even more important.
LOCATION
- This position can sit 100% remote.
DUTES & RESPONSIBILIES
- Investigates and prioritizes manual cryptographic use cases for automation and/or self-service.
- Exception Identification: Identify situations where the standard cryptographic policies may not be applicable or efficient.
- Manages HSM’s, Certificate Authorities, and ability to think critically about the Cryptography lifecycle.
- Exception Evaluation: Evaluate the potential risks and benefits associated with granting an exception.
- Cryptography Strategy: Define appropriate cryptographic algorithms, protocols, and key management practices.
- Cryptography Governance: Participate in developing cryptography policies, guidelines, and standards to ensure compliance.
- Establishes accountability frameworks and decision-making matrices for analysts and teams to securely support business objectives.
- Collaborates with Business, App, IT, and ISO teams to validate and enhance our company Standards to drive our competitive advantage through technology advancement.
MINIMUM REQUIREMENTS
- Bachelor of Science in Computer Science, Mathematics, Engineering or equivalent experience or education
- Requires 3+ years of experience in a hands-on Cryptography role with a demonstrated proficiency of automating infrastructure and application deployments.
- Demonstrated mastery of network, infrastructure, and application cryptography implementations.
- Demonstrated scripting skills in one or more popular languages like bash, python, or PowerShell.
- Proficiency in working in both Linux and Windows environments.
- Understanding of cloud computing platforms and cloud-based infrastructure design and operation
- Understanding of container technologies tooling (such as Docker, Kubernetes, Helm)
- Understanding of networking, routing, and web related protocols
- Functional working knowledge of: Cyber Security Fundamentals (Familiarity with key concepts of Vulnerability Management, Network Security/Secure Transmission Management, Data Loss Prevention, Identity Access Management, Threat Intelligence, Penetration testing, IT Risk Management).
- High level of professionalism, confidence, and ability to build credibility with team members and business partners.
- Ability to effectively handle multiple priorities, prioritize and execute tasks in a high-pressure environment.
- Excellent verbal and written communications including technical writing capabilities.
- Highly motivated with strong organizational, analytical, decision making, and problem-solving skills.
PREFERRED EXPERIENCE
- Experience with Microsoft Azure and VMWare.
- Experience with Azure DevOps.
- Current Cybersecurity focused certification (e.g., CEH, CCSP, CISSP, CCS, or ECES).
- Strong business and technology aptitude with a willingness to learn and understand business and software solutions.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Automation Azure Bash CCSP CEH CISSP Cloud Compliance Computer Science Cryptography DevOps Docker Governance Helm Kubernetes Linux Mathematics Network security Pentesting PowerShell Python Risk management Scripting Strategy Threat intelligence VMware Vulnerability management Windows
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.