We are TransUnion and we are proud of the remarkable achievements we have made in the consumer credit information services industry. If you share our competitive spirit and take pride in your professional accomplishments, consider joining TransUnion today. Responsibilities Position is responsible for conducting technology related security investigations and security compliance monitoring activities. For investigations, the position will in computer and network forensic examinations using TransUnion established processes and leading industry practices. Investigative duties include data recovery and in-depth technical analysis of incidents involving various types of computer and network technology devices. Position is required to obtain/store investigative data, conduct full network and system examinations, analyze various types of hardware, and prepare detailed incident reports. While conducting compliance monitoring activities, the position is responsible for the planning, design, enforcement, and review of technology events to help ensure compliance with security policies, standards, and procedures under appropriate management guidance. Position also maintains knowledge of changing technologies, provides recommendations for adaptation of new technologies or policies, and assists in the delivery of risk assessments / security briefings to management advising them of critical issues and metrics that may affect customer or corporate security objectives. Serves as an internal information security consultant to TransUnion, advising internal business units with current information about information security technologies, new security threats and security related regulatory issues. Apply internal control concepts in a wide variety of information technology processes and appropriately assess the exposures resulting from ineffective or missing control practices. 1. Conduct forensic examination activities including analysis of various types of network, computer, and technology devices which may contain digital evidence. 2. Adhere to all applicable TransUnion established processes and leading industry practices in the conduct of forensic examinations in a documented, consistent, and repeatable manner. 3. Ensure the integrity of electronic evidence so that it is admissible in a court of law through the use of evidentiary sound data collection, processing, storage techniques. 4. Provide subject matter experience in the use of network and system forensic processes, tools (hardware & software), data recovery, and examination techniques. 5. Identification, testing, setup, and maintenance of information security forensic tools / analysis equipment. 6. Liaison with other TransUnion departments and external investigative / compliance agencies on investigations involving TransUnion owned technology assets. 7. Perform monitoring/reviews, draft periodic reports, and conduct follow-up examination activities to ensure that the TransUnion systems are operational, effective and are in compliance with all Security policies and standards. 8. Respond and research to alerts identified by monitoring systems logs / events to determine if an incident has occurred. 9. Apply internal control concepts in a variety of information technology processes and assess the exposures resulting from ineffective or missing control practices. 10. Serve as an internal information security consultant to TransUnion by assisting in the delivery of advisory services to internal business units with current information about information security technologies, new security threats, and security related regulatory issues. 11. Oversees and/or assess the security of databases and data transferred both internally and externally. 12. Communicate with various departments and business units regarding sensitive and confidential issues. 13. Respond to inquiries regarding defined information security policies, standards, and procedures. 14. Interact with vendors, outsourcers, and contractors to evaluate technology related security products under appropriate management guidance. 15. Ability to work independently on multiple project and task assignments. 16. Work with information security team members in the collective effort of protecting TransUnion’s information assets. 17. Provide 24×7 on-call security investigative support. 18. Performs other related duties as assigned. Qualifications The duties and responsibilities described above are the essential functions of the job. The qualifications below are representative of the knowledge, skills, and/or abilities required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Bachelor degree in Computer Science or Computer Engineering. 2-5 years experience specific to network and system-based computer forensics. 2 additional year experience in corporate networks and performing examiner functions. – Strong knowledge of evidentiary handling and chain of custody requirements. – Understanding of Industry “Best Practices” and laws relating to data privacy and protection. – Knowledge and documented training in the use of computer forensics and/or security compliance tools. – Demonstrated experience conducting remote network-based incident investigations. – Ability to conduct research on industry trends, methods, issues, and products. – Strong knowledge of incident types, trends, and exploits. – Ability to read network diagrams and device configurations. – In-depth troubleshooting knowledge of LDAP, TCP/IP, and related protocols. – Knowledge and experience with anti-virus management software and encryption / decryption software. – Ability to read / interpret reports from IDS /RNA and vulnerability scanning utilities. – Knowledge of Windows (2000 & XP) and Linux (AIX, Redhat & Suse) platforms. – Hands-on experience with Windows 2003, Novell, and zLinux is a plus. – Experience in CISCO based networking and firewall products a plus. – Knowledge of law enforcement practices as related to security is helpful. – Ability to execute tasks in a high-pressure environment. – Experience working in a team-oriented, collaborative environment. – Working knowledge of ITIL foundations and/or ISO 17799. – Demonstrated experience with analytical problem-solving. – Highly motivated, self-directed, and detail oriented attitude. – Ability to communicate clearly in a written form. – Project management experience is a plus. – Must be willing to be on call 24×7 – Ability to travel (up to 5%). – Ability to lift computer equipment which can weigh up to 75 lbs. Experience with the following vendor toolsets is desired: – Guidance Software Encase Forensic, Encase Enterprise – Pathway Technologies ProDiscover – Internet Security Systems ISS Scanner – Network Associates Cybercop – SandStorm Phone Sweep – Microsoft SUS, SMS, SysInternals – Symantec Antivirus, BindView is a plus At least one of the following certification is required: – CCCI (Certified Computer Crime Investigator) – CCFT (Certified Computer Forensics Technician) – CFCE (Certified Forensic Computer Examiner) – EnCE (Encase Certified Examiner) – GCFA (Forensic Analyst) – GCIH (Incident Handling) – CISSP (Certified Information Security Professional) – CISA (Certified Information Systems Auditor) Additional certifications considered valuable to this position include: – Microsoft, Linux, or Cisco Closing Statement We offer competitive salaries, comprehensive benefits, a business-casual environment, and a convenient downtown location as well as a free on-site fitness center. TransUnion is an Equal Opportunity/Affirmative Action Employer; M/F/D/V. TransUnion values the advantages gained from a diverse workforce. For immediate consideration, click on the link below.https://careers.transunion.com/psc/HC89/EMPLOYEE/HRMS/c/HRS_HRAM.HRS_CE.GBL?Page=HRS_CE_JOB_DTL&Action=A&JobOpeningId=3282&SiteId=3 Related content feature What it takes to be a malware analyst The proliferation of ransomware and other attacks has increased demand for experts who can analyze how the software works and devise a response. By Bob Violino Jun 15, 2017 7 mins Careers IT Leadership Security news New CISO Chris McDaniels to help drive Mosaic451’s cybersecurity practice The US Air Force veteran brings deep experience in cyber defense and emergency response. By Michael Nadeau May 23, 2017 2 mins IT Leadership Security news Veristor hires Jackie Groark as director, security/CISO Groark, an expert in threat detection and intelligence, will lead the company’s security practice. By Michael Nadeau May 17, 2017 2 mins IT Leadership Security news BJC names Matthew Modica as its first chief information security officer Modica will be responsible for all levels of security, from operations to IT to facilities. By Michael Nadeau May 15, 2017 1 min IT Leadership Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe