Position Overview • Develops, maintains and applies relevant security policies and procedures to protect systems and facilities from intentional or unintentional damage: • Designs, implements, administers and tests firewalls, software and / or hardware. Ensures that proprietary / confidential data, systems and facilities are protected. • Performs analysis of access control and violations. • Performs audits to ensure compliance with internal security standards and regulatory requirements. • Maintains established service levels for all services. Ensures timely troubleshooting of issues and effective communications with impacted users. Advises operations of potential problem areas, which may influence production schedules. • Upgrades policies and procedures according to changing security requirements. • Remains informed on trends and issues impacting technology security, including current and emerging technologies and practices. • May participate in indoctrinating interns and / or new employees. • Performs other duties as assigned. Qualifications • Bachelor's degree in Computer Science, Network Engineering, or related discipline. Equivalent combination of experience and education will also be considered. May begin pursuing pertinent certification(s), such as the Certified Information Systems Security detail oriented (CISSP), Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM), Global Information Assurance Certification (GIAC), etc. • Minimum 2 – 5 years related experience in working with IT security and facility security system technologies in a large complex wide area network (WAN) environment with multiple locations required. a. Experience in executing security policies. • Working knowledge of applicable laws and regulations as they relate to security. • Exposure to data processing, hardware platforms, enterprise software applications, and outsourced systems; good understanding of computer systems characteristics, features, and integration capabilities. • Some experience with systems design and development from business requirements analysis through to day-to-day management. • Experience in the manufacturing or information technology industry is preferred. • Ability to resolve moderately complex to complex issues regarding Information System security. • Demonstrates working knowledge, practical skills and the ability to perform work under moderate supervision.