Sr Cyber Security Engineer Law Enforcement & Security - Jackson, MI at Geebo

Sr Cyber Security Engineer

Join the diverse and dynamic team that powers Michigan's largest energy provider and one of the nation's largest gas and electric combination utilities. Consumers Energy services 6.7 million of Michigan's 10 million residents - caring for our friends and neighbors in all 68 Lower Peninsula counties. We embrace a cleaner and leaner utility vision focused on eliminating energy waste and adding renewable energy from sources such as wind and solar.


At Consumers Energy, we offer more than just a place to work. We foster a culture that supports career development, growth, and stability, and we take pride in offering our co-workers excellent benefits and compensation packages. We are deliberately creating an inclusive culture that makes our diverse team of co-workers feel valued, supported, and empowered every day. We're a company made up of thousands of people, all with different stories to share and work to do, but we stand united in our company purpose:
world class performance delivering hometown service.



Department Summary


The Cyber Security Engineering and Design Team within the Information Security (IS) department at Consumers Energy provides reliable and secure services to internal clients across multiple locations within the Consumers Energy enterprise. The team has a very strong focus on system confidentiality, integrity, and availability through the design, engineering, and implementation of highly secure solutions. Additionally, the team is tasked with creating and managing detailed documentation and procedures to ensure consistency between security engineering and operations.



Job Description/Responsibilities


The Security Engineer is primarily responsible for planning and building effective computing solutions to increase the security of Consumers Energy corporate systems by direct and indirect interaction with business partners and implementation projects.


The Security Engineer will consult on the design, development, integration, and analysis of platforms, working with systems, hardware, software, and variety of technical and non-technical teams to deliver adequate monitoring solutions to mitigate risks while meeting the business objectives.



Key responsibilities include:


  • Formal documentation of all department specific work products
  • Independent and group-based technology and security research, development, techniques, countermeasures, and trends in computer and network vulnerabilities and exploits
  • Lead and/or participate in technology security reviews with the ability communicate issues and risks in business terms and to make recommendations that balance the risk/reward tradeoffs towards enabling business agility
  • Plan and build well integrated security capabilities that align with the cyber security roadmap and span multiple operating environments including but not limited to internal, public cloud, private cloud, and mobile


Required Qualifications


  • Bachelor's degree from an accredited college or university in engineering, computer science, related field, or equivalent combination of education & experience.
  • 5
    years' experience in cyber security, network and/or application security engineering, or other closely related discipline is required
  • 3 years of hands on experience working with the following technologies:

    • Firewalls
    • Proxy's
    • Network Architecture Design
    • Privileged Account Management
    • Endpoint Security Platforms
    • Cloud Technology AWS/Azure


Preferred Qualifications


  • Masters or other advanced degree, ideally in an IT or Business area
  • Energy industry background that includes a working knowledge of effectively mapping technology to business challenges
  • CISSP, GISP, GPEN, GWAPT, or related SANS certifications are highly preferred
  • Proven hands-on experience with data gathering, system, and process automation/orchestration via XML, Python, PowerShell, Ruby, or other scripting languages which may or may not leverage platform APIs
  • Experience with AWS/Azure security frameworks.
  • General familiarity with industry specific security standards such as SANS Top 20, PCI DSS, HIPAA, NERC/CIP, NIST 800 series
  • Proven oral, written, and presentation skills with various audiences from technical, business customer, and management, including the ability to drive technical change and constructively influence peers and leadership
  • Self-motivated, results oriented, with demonstrated leadership and problem-solving abilities
  • Experience documenting, presenting, and communicating technical solution designs and operating procedures via Microsoft productivity suite; Lync, Visio, Word, PowerPoint, and Excel


Overview


The IT Technical Job Family is utilized in Information Technology. Typically, employees in this job family are required to design or maintain technology systems, to utilize various computer software programs, and to design, develop and/or provide advice and counsel on the operation of equipment, processes and procedures. They are responsible for ensuring adherence to laws and regulations applicable to Company employees. This job family includes Application Development, Infrastructure, Information Security, and Architecture.



Nature of Work


Duties can include network management, software development and database administration. May also provide technical support to a business or an organization's employees and train non-technical workers on the business' information systems. May design systems and assess the effectiveness of technology resources already in use or new systems that are being implemented. Determines the practicality of changes and modification of systems. Works with external partners, including consultants, agencies and vendors, to arrive at the most appropriate system or integration of multiple systems. With information technology constantly changing, must stay up-to-date on emerging technologies and the potential effectiveness of these advancements in their current system.



Essential Functions


Works closely with department managers and users to define and analyze business and operational problems, process improvement opportunities and requirements; analyzes operational and business mandates and legal requirements; identifies and analyzes complex, ambiguous and/or conflicting business process issues; advises department managers on applications development, enhancement and maintenance issues; explains technology and process options and assists managers in analysis and decision making; analyzes management information needs and recommends data and reporting processes; coordinates the development of department priorities and works within IT to align initiatives to these priorities; facilitates user meetings and joint development sessions. Develops and refines business models and relationship diagrams; evaluates methods of improving efficiency and cost effectiveness of business, technical and operational processes; works with users to reengineer work processes; analyzes functional business requirements and translates user expectations into detailed business requirements, specifications and success criteria; works with Information Systems to develop conceptual proposals for business process automation initiatives; recommends work process and/or operational changes to complement system functionalities; serves as an advocate for department needs with IT; stays abreast of developments in departmental processes to anticipate emerging technology needs. Participates in the development of statements of work for RFPs/RFIs; participates in evaluating vendor applications and solutions; coordinates department review of vendor deliverables for accuracy and completeness, ensuring that department needs and requirements have been met. Develops significant application/hardware solutions to problems and addresses change request issues that require assignment of resources. Analyzes and troubleshoots complex and sometimes urgent applications problems and errors; takes action or communicates solutions to problems; answers technical questions and provides guidance to users on system functionalities and methods for correcting problems. Develops training materials and handouts; conducts user applications training classes and one-on-one training sessions; develops and maintains user and system documentation. Designs and generates custom reports to meet user needs; uses reporting tools to extract user-required data. Plans and coordinates the deployment of new technologies for client solutions; coordinates user acceptance testing and the resolution of problems identified. Regular attendance is expected.



Hours and Travel


Meet travel requirements of the position. Work a flexible schedule, which may include evenings, weekends, holidays and overtime.



Physical Demands


The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to sit, stand, walk, stoop, kneel, crouch, crawl, and use hands to finger, handle, or feel objects. The employee frequently is required to talk or hear. The employee must lift and move up to twenty pounds. Specific vision abilities required by this job include close vision, color vision, depth perception, and the ability to adjust focus. The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. The noise level in the work environment is usually moderate.



All qualified applicants will not be discriminated against and will receive consideration for employment without regard to protected veteran status, disability, race, color, religion, sex, sexual orientation, gender identity or national origin.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.