Secure your tomorrow with Unisys : A great place to learn and grow your career! At Unisys, every associate makes a difference.
Here, you have the opportunity to learn new skills, apply your expertise, explore local and global challenges, and solve complex technology issues with creative solutions and diverse teams.
You are part of a team that drives change and delivers results on a daily basis. Our success is a direct result of our people.
Evaluates, tests, recommends, develops, coordinates, monitors and maintains cyber security systems, policies and procedures, including access management for hardware, firmware and software.
Achieve the productivity metrics associated with their position. Key Responsibilities
Responsible for the identification, tracking and management of enterprise risks. This includes performing risk assessments and measuring the success and effectiveness of mitigation efforts.
Identifies, evaluates, tests and implements appropriate security products, tools, and systems to establish and ensure a secure infrastructure.
Articulates security policies, guidelines and standards to customers and developers.
Able to apply basic theories, concepts, principles and methodologies to developmental assignments. Assignments given typically have developmental qualities.
Evaluates, tests, recommends, develops, coordinates, monitors and maintains information systems (IS) and cyber security policies, procedures and systems, including access management for hardware, firmware and software.
Ensures that IS and cyber security architecture / designs, plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS and cyber security.
Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security.
Develops techniques and procedures for conducting IS and cyber security risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents.
Implements IS and cyber security policies and takes measures against intrusion, frauds, attacks or leaks. Key Qualifications
Requires a Bachelor’s Degree in Security, Networking, Technology and a minimum of 2 years' related experience or equivalent.