Remote IT Security Engineer

Remote IT Security Engineer needs 10 plus years of ACF2 experienceRemote IT Security Engineer requires 10 plus years of ACF2 experience Extensive knowledge of z OS System & Security A minimum of 20 years experience with ZOS Experience with ZOS assembler exits Experience with REXX CLIST programming Experience establishing SSL and Digital Certificate risk assessment business continuity DR etc. Software Application security (i.e. z OS CICS DB2 IMS MQSeries JES2) z OS System and Sub-System knowledge (i.e. JCL SDSF JES2 FTP) Demonstrated expertise in designing and supporting an ACF2 security model for mainframe which keeps data assets secure while allowing complex ecosystems of applications to function on the mainframe Passionate cyber security professional eager to learn and build upon existing skills into new technologies or applications of technologies High level of perseverance energy and confidence to act as ACF2 security Subject Matter Expert Self-Starter that requires minimal oversight - Able to multitask set priorities and lead projects and meetings Additional Preferred Qualifications Familiarity with ACF2 RACF role-based access governance Experience with IBM z OS Connect Experience with Splunk CyberArk SailPoint and their integration to mainframe Remote IT Security Engineer duties Implement industry-aligned system and security controls to Client platforms which balance the complex global demands of Client business users with the objectives of securing assets appropriately within the mainframe Create and update technical documentation including design documents standard operating procedures and runbooks Collaborate and communicate with Security Consulting Enterprise Infrastructure and other internal departments and vendor partners to deliver and troubleshoot solutions Provide problem solving expertise and assist in troubleshooting of system-related issues to restore services in a timely manner to include ACF2 or other mainframe technologies IAM systems and authentication authorization and encryption technologies solutions and best practices Follow and apply configuration and security standards and policies within the Client Enterprise Change Management process Ensure that system improvements and changes follow enterprise change management procedures and are implemented correctly and completely and monitor all effects of modifications Establish and recommend policies and standards for system access and controls Serve as a technical expert for second and third-level support teams

Share:

Important!

There are a lot of advertisers on Advertigo. We cannot check them one by one.

You work hard for your money and you want a company you can rely on when you are buying or selling things. That’s why we want to help you protect yourself from fraud. In this section, you’ll find informative tips and other useful material to stay informed and help reduce your chances of falling victim to scammers.

Please understand that Advertigo.net is a free service to help buyers and sellers (and etc.) find one another. Advertigo.net is not involved in any transactions and can not police the actions of our many users.