Information Security Engineer improving and maintaining security infrastructure while adhering to Church policy. Works on compliance, risk assessments, and security monitoring initiatives.
Responsibilities
The Information Security Engineer 2 is an intermediate level professional role that functions as an oversight engineer for the organization.
This role works to improve and maintain security infrastructure while adhering to Church policy.
This position may work on initiatives involving internal and external compliance, risk, vulnerability and threat monitoring and assessments.
This position works under moderate supervision.
This role ensures that information security controls are properly implemented, monitored and maintained to protect organizational data and systems.
This individual assists the business in defining objectives, processes and measurements.
This is an individual contributor role.
Requirements
Bachelor’s degree in related field or equivalent professional experience
Two years of related experience (can be an internship in Information Security, IT and/or Computer Science including expertise in one or more of the following areas:
Security, privacy, business continuity, compliance or related area(s), attacker tactics for both enterprise and web systems, cyber threat intelligence, incident handling, continuous monitoring, intrusion detection, advanced network forensics, host forensics, SIEM, SOC processes, and malware analysis
Proven ability to assist with the design and implementation of security controls that meet business operational needs
Ability to successfully collaborate with a team
Familiarity with programming and scripting
Good professional written and oral communication skills
This job operates in a professional office environment
To successfully perform the essential functions of the job there may be physical requirements which need to be met such as sitting for long periods of time and using computer monitors/equipment
Preferred:
Relevant security certification from one or more of the following or equivalent certifying authorities: GIAC, CompTIA, ISC2, EC-Council, etc.
Benefits
Only members of the Church who are worthy of a temple recommend qualify for employment.
The Church will make reasonable accommodations for qualified individuals with known disabilities.
Security and Privacy SME at Dynanet Corporation responsible for data management compliance and governance guardrails. Ensuring secure data handling and adherence to federal regulations.
PAM Manager responsible for strategy, roadmap, and operations of PAM program at Intact. Leading a team to safeguard privileged identities and secrets across various environments.
Senior Cybersecurity Vulnerability Management Versatilist at Boeing. Protecting the IT ecosystem by innovating vulnerability management solutions and leading security initiatives.
Entry level Associate Security Engineer at Navy Federal securing technical infrastructure and workloads with operational capabilities and threat monitoring practices.
Machine Learning Researcher focusing on innovative AI and intelligent automation for cybersecurity. Driving research in Agentic AI and collaborating with cross - functional teams for production - grade features.
EHS - Management expert overseeing environmental, health, and safety compliance at ZF. Collaborating with teams to foster a safe work culture and manage regulatory compliance.
Cybersecurity Lead - Product Security at Celestica securing network hardware and operating systems. Lead the 'Secure by Design' principles and operationalize standardized SDLC within product engineering teams.
Senior Technical Lead architecting and securing multi - cloud environments for Celestica. Leading cloud security projects focusing on Google Cloud, Azure, and Google Workspace.
Senior Technical Lead responsible for architecting and implementing global network security solutions. Collaborating with internal and external teams to meet cybersecurity requirements for Celestica.
Senior Manager of Information Security at Celestica overseeing cybersecurity policies and practices. Requires extensive experience in threat hunting, control validation, and security architecture reviews.