Title: Senior Information Security EngineerLocation: Atlanta GA Summary: This position analyzes enterprise security data to identify and mitigate risk across all business segments. Must be able to perform technical security audits such as penetration testing and application security code reviews, participate in security architecture design reviews, update security policies, and be familiar with eForensics and Investigative practices. Must have comprehensive knowledge of symmetric and asymmetric encryption techniques and strategies. Must have detailed knowledge of Microsoft technologies including Active Directory, Exchange, SharePoint and related network services and protocols. Must have a passion for technical information security principles, and a strong drive for personal development in this space. This position will be responsible for assisting with enterprise compliance testing, and should be familiar with applicable state and federal laws regarding information security and electronic privacy. This position tilizes strong information security skills and expertise within a broad range of activities and technologies. It also involves interaction with a variety of other non-technical departments and business functions, so strong verbal and written communication skills are a must. Ideal candidate will possess strong scripting or programming skills in VBScript, PERL, C#, VB.NET or Java.Responsibilities:* With limited to no supervision, perform all activities asked to ensure the safety of technologies* Strong knowledge of security technologies in areas such as IDS, IPS, Firewalls, SIM, Anti-virus, and extrusion prevention* Experience in vulnerability scanning, analysis and automation for enterprise environments (>10,000 hosts)* Experience in conducting penetration tests for Network, OS, applications, and databases* Experience conducting security risk assessments* Knowledge of software development life cycles (SDLC), and various methods of integrating security in the SDLC* Familiarity with ISO 17799, PCI, SOX, and other state and federal information security / privacy laws* Strong analytical skills* Strong written and verbal communication skills* CISSP, CISM, CPTE/CPTS, or Certified Ethical Hacker preferredQualifications:* 6-8 years of direct technical information security experience* Demonstrated knowledge of information security industry trends, and emerging Typical Training / Experience – Typically requires BS/BA in related discipline; Generally 5-8 years of experience in related field. Certification is required in some areas OR MS/MA and generally 3-5 years of experience in related field. Dept/Org Scope & Impact – Seasoned professional contributor with responsibility for an advanced area of work in the professional field; May be responsible for entire projects or functions having modest scope/impact or portions of projects having considerable scope/impact to department, area, and, at times, business unit results Problem Complexity – Performs advanced areas of work for the professional field; Identifies key barriers/core problems and applies problem-solving skills in order to deal creatively with complex situations. Troubleshoots and resolves complex problemsAutonomy – Independently performs assignments with instruction limited to results expected. Determines and develops approach to solutions; Receives technical guidance only on unusual or complex problems or issues Knowledge – Possesses and applies comprehensive knowledge of particular field of specialization to the completion of complex assignments. Advanced knowledge of organization’s technologies and practicesPrimary contribution is in applying knowledge (product, industry, professional, technical) rather than managing people. Greater than 50% of time is doing individual contributor work No responsibility for developing and managing operating plans/budgetsInfluence/People Leadership – May oversee the completion of projects or assignments, including planning, assigning, monitoring, and reviewing progress and accuracy of work, evaluating results, etc.; Contributes to employees’ professional development, but does not have hiring or firing authority Apply to Tonya Butler at Tonya.Butler@cox.com Cox Communications is a multi-service broadband communications and entertainment company with more than 6 million total residential and commercial customers. The third-largest cable television company in the U.S., Cox offers an array of advanced digital video, high-speed Internet and telephony services over its own nationwide IP network, as well as integrated wireless services in partnership with Sprint (NYSE: S). Cox Business Services is a full-service, facilities-based provider of communications solutions for commercial customers, providing high-speed Internet, voice and long distance services, as well as data and video transport services for small to large-sized businesses. Cox Media offers national and local cable advertising in traditional spot and new media formats, along with promotional opportunities and production services. More information about the services of Cox Communications, a wholly owned subsidiary of Cox Enterprises, is available at www.cox.com, www.coxbusiness.com, and www.coxmedia.com.Cox Communications, Inc. and its subsidiaries are Equal Opportunity Employers. We have a tradition of encouraging a wide diversity of talents through a broad range of hiring practices. Please note those individuals submitting resumes online or by mailing a resume are not considered an applicant for employment until a signed employment application form is completed, usually at the time of interview.information assets. Related content feature What it takes to be a malware analyst The proliferation of ransomware and other attacks has increased demand for experts who can analyze how the software works and devise a response. By Bob Violino Jun 15, 2017 7 mins Careers IT Leadership Security news New CISO Chris McDaniels to help drive Mosaic451’s cybersecurity practice The US Air Force veteran brings deep experience in cyber defense and emergency response. By Michael Nadeau May 23, 2017 2 mins IT Leadership Security news Veristor hires Jackie Groark as director, security/CISO Groark, an expert in threat detection and intelligence, will lead the company’s security practice. By Michael Nadeau May 17, 2017 2 mins IT Leadership Security news BJC names Matthew Modica as its first chief information security officer Modica will be responsible for all levels of security, from operations to IT to facilities. By Michael Nadeau May 15, 2017 1 min IT Leadership Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe