Title: Senior Information Security EngineerLocation: Atlanta GA Summary:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 This position analyzes enterprise security data to identify and mitigate risk across all business segments.\u00a0 Must be able to perform technical security audits such as penetration testing and application security code reviews, participate in security architecture design reviews, update security policies, and be familiar with eForensics and Investigative practices.\u00a0 Must have comprehensive knowledge of symmetric and asymmetric encryption techniques and strategies.\u00a0 Must have detailed knowledge of Microsoft technologies including Active Directory, Exchange, SharePoint and related network services and protocols. Must have a passion for technical information security principles, and a strong drive for personal development in this space.\u00a0 This position will be responsible for assisting with enterprise compliance testing, and should be familiar with applicable state and federal laws regarding information security and electronic privacy.\u00a0 This position tilizes strong information security skills and expertise within a broad range of activities and technologies. It also involves interaction with a variety of other non-technical departments and business functions, so strong verbal and written communication skills are a must.\u00a0 Ideal candidate will possess strong scripting or programming skills in VBScript, PERL, C#, VB.NET or Java.Responsibilities:*\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 With limited to no supervision, perform all activities asked to ensure the safety of technologies*\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Strong knowledge of security technologies in areas such as IDS, IPS, Firewalls, SIM, Anti-virus, and extrusion prevention*\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Experience in vulnerability scanning, analysis and automation for enterprise environments (>10,000 hosts)*\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Experience in conducting penetration tests for Network, OS, applications, and databases*\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Experience conducting security risk assessments*\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Knowledge of software development life cycles (SDLC), and various methods of integrating security in the SDLC*\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Familiarity with ISO 17799, PCI, SOX, and other state and federal information security \/ privacy laws*\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Strong analytical skills*\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Strong written and verbal communication skills*\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 CISSP, CISM, CPTE\/CPTS, or Certified Ethical Hacker preferredQualifications:*\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 6-8 years of direct technical information security experience*\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Demonstrated knowledge of information security industry trends, and emerging \u00a0Typical Training \/ Experience - Typically requires BS\/BA in related discipline; Generally 5-8 years of experience in related field. Certification is required in some areas OR MS\/MA and generally 3-5 years of experience in related field. Dept\/Org Scope & Impact - Seasoned professional contributor with responsibility for an advanced area of work in the professional field; May be responsible for entire projects or functions having modest scope\/impact or portions of projects having considerable scope\/impact to department, area, and, at times, business unit results Problem Complexity - Performs advanced areas of work for the professional field; Identifies key barriers\/core problems and applies problem-solving skills in order to deal creatively with complex situations. Troubleshoots and resolves complex problemsAutonomy - Independently performs assignments with instruction limited to results expected. Determines and develops approach to solutions; Receives technical guidance only on unusual or complex problems or issuesKnowledge - Possesses and applies comprehensive knowledge of particular field of specialization to the completion of complex assignments. Advanced knowledge of organization's technologies and practicesPrimary contribution is in applying knowledge (product, industry, professional, technical) rather than managing people.\u00a0 Greater than 50% of time is doing individual contributor work No responsibility for developing and managing operating plans\/budgetsInfluence\/People Leadership - May oversee the completion of projects or assignments, including planning, assigning, monitoring, and reviewing progress and accuracy of work, evaluating results, etc.; Contributes to employees' professional development, but does not have hiring or firing authority\u00a0Apply to Tonya Butler at Tonya.Butler@cox.comCox Communications is a multi-service broadband communications and entertainment company with more than 6 million total residential and commercial customers.\u00a0 The third-largest cable television company in the U.S., Cox offers an array of advanced digital video, high-speed Internet and telephony services over its own nationwide IP network, as well as integrated wireless services in partnership with Sprint (NYSE: S).\u00a0 Cox Business Services is a full-service, facilities-based provider of communications solutions for commercial customers, providing high-speed Internet, voice and long distance services, as well as data and video transport services for small to large-sized businesses.\u00a0 Cox Media offers national and local cable advertising in traditional spot and new media formats, along with promotional opportunities and production services.\u00a0 More information about the services of Cox Communications, a wholly owned subsidiary of Cox Enterprises, is available at www.cox.com, www.coxbusiness.com, and www.coxmedia.com.Cox Communications, Inc. and its subsidiaries are Equal Opportunity Employers. We have a tradition of encouraging a wide diversity of talents through a broad range of hiring practices. Please note those individuals submitting resumes online or by mailing a resume are not considered an applicant for employment until a signed employment application form is completed, usually at the time of interview.information assets.