Director SIEM Engineering
Columbus, Georgia, USA
Global Payments
Every day, Global Payments makes it possible for millions of people to move money between buyers and sellers using our payments solutions for credit, debit, prepaid and merchant services. Our worldwide team helps over 3 million companies, more than 1,300 financial institutions and over 600 million cardholders grow with confidence and achieve amazing results. We are driven by our passion for success and we are proud to deliver best-in-class payment technology and software solutions. Join our dynamic team and make your mark on the payments technology landscape of tomorrow.
-
Summary of This Role
Develops and leads the following highly technical and specialized area within information security: Security Incident and Event Management. Manages the development, deployment and execution of enterprise security controls and defenses. Monitors, analyzes and exploits system vulnerabilities to detect potential threats. Executes containment, mitigation and protection processes to safeguard against real time threats while maintaining critical documentation and evidence. Determines risk and exposure from security breaches and resolves incidents while providing guidance to business decision-makers.
What Part Will You Play?
- Delivers advanced information security solutions to align security solutions with strategic business goals. Guides the technical review of security controls for processes, solutions and technologies for third party assurance, corporate compliance and internal and external data security obligations.
- Approves enterprise level development projects. Contributes to the development and implementation of short-term architectural roadmap to reduce risk associated with known and emerging information security threats across the enterprise. Executes information security's architectural strategy for managing risk across the enterprise.
- Reviews investigation reports and translates findings to identification of future risks and actionable plans to protect the enterprise. Issues gap analysis reports that measure the security posture of the organization and partners. Acts as an escalation point and decision maker for all major security incidents across the enterprise.
- Directs cyber security research efforts to continually adapt processes and technologies in order to meet an ever changing threat landscape. Partners with internal and external experts to develop advanced threat detection techniques leveraging emerging technologies.
- Provides actionable intelligence and recommendations to enable security resources to more effectively prioritize protections against cyber threats. Reviews and approves threat assessment required control definitions and procedure appropriateness. Guides the development of on-going Information Security monitoring programs to regularly measure control effectiveness.
- Organizes high profile hacking scenarios involving internal and external experts to validate enterprise wide system integrity and data confidentiality. Defines and implements guidelines to ensure accurate and complete documentation and reporting. Assists management in continuously enhancing the organization’s security frameworks, standards and principles.
- Reviews security solution recommendations to ensure security risks are appropriately controlled and services remain in compliance with internal and regulatory security policies and standards. Validates new user needs or program enhancements and implements appropriate security plans and control techniques. Simplifies complex and challenging concepts for stakeholders, documenting and presenting the required control frameworks and gaining acceptance. Directs communication with internal counterparts to set priorities for enhanced security reporting and monitoring.
- Not an exhaustive list; other duties as assigned.
What Are We Looking For in This Role?
Minimum Qualifications
- Bachelor's Degree
- Relevant Experience or Degree in: Information Security or Computer Science preferred. Other majors will be considered.
- Typically a minimum of 10 years
- Related professional experience including a minimum of 5-6 years experience in a managerial position.
- One or more of the following-CISSP, CISA, CISM, PCI-QSA, PA-QSA, PCIP, CRISC, CGEIT, Certified Forensic Computer Examiner (CFCE), Certified Cyber Threat Analyst (CCTA), Certified Computer Examiner (CCE)
Preferred Qualifications
- Master's Degree
- Related field of study from an accredited university.
- Prior Global Payments, payment or technology industry experience is preferred.
At Global Payments our vision is to be “Champions of Inclusion.” We are fully committed and focused on creating a better tomorrow in the communities in which we live and work. We aspire to ensure fair treatment, access, opportunity and advancement for all team members. We believe all team members should be able to bring their true, authentic selves to the workplace and feel accepted, engaged and understood.
Global Payments offers a comprehensive benefits package to all of our team members, including medical, dental and vision care, EAP programs, paid time off, recognition programs, retirement and investment options, charitable gift matching programs, and worldwide days of service. To learn more, review our Benefits page at: https://jobs.globalpayments.com/en/why-global-payments/benefits/
-
Global Payments Inc. is an equal opportunity employer. Global Payments provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex (including pregnancy), national origin, ancestry, age, marital status, sexual orientation, gender identity or expression, disability, veteran status, genetic information or any other basis protected by law. If you wish to request reasonable accommodations related to applying for employment or provide feedback about the accessibility of this website, please contact jobs@globalpay.com.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: CFCE CISA CISM CISSP Compliance Computer Science CRISC Exploits Monitoring SIEM Strategy Threat detection Vulnerabilities
Perks/benefits: Career development Health care
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.