• Security Solutions Integrator

    Job Locations US-TX-Fort Worth
    Information Technology
  • Overview

    The Security Solutions Integrator (IT) is responsible for the design, implementation, and support of the company’s information security core infrastructure systems and platforms spanning multiple Data Centers. This position is highly technical and requires skills in variety of competencies. The position will collaborate with various teams to solve complex problems and implement security strategies to enhance existing architecture, scalability, and availability of platforms for business operations. This position is located in our Downtown Fort Worth, TX office. 


    • Highly developed IT Security principles and demonstrated experience in designing, implementing and architecting highly available enterprise infrastructure services
    • VMware experience in implementing security controls in private cloud computing and Data Center virtualization using VMware (ESXi, vCenter, vCloud, vRealize, NSX)
    • Experience with Palo Alto (PA)
    • Responsible for leading, developing, and enforcing compliance with Company Information Security standards and policies across Business & IT projects
    • Proven experience leading implementation programs for improved network security, including segmentation, perimeter and in-depth monitoring, and active response
    • Provide specific guidance regarding security requirements and mitigations for securing business use cases with defense in-depth strategy
    • Ability to articulate the relevant security controls to mitigate risks on projects in a manner to apply appropriate controls based upon data exposure risks
    • Conduct software security assessments including threat modeling, security control reviews and vulnerability assessments
    • Work with application and functional teams across the business to encourage a security mindset throughout software development lifecycle from concept to testing and implementation
    • Proven ability to succinctly communicate complicated technical security issues and the risks they pose to R&D programmers, network engineers, system administrators and management
    • Hands-on ability in management, upgrading, patching and troubleshooting issues on security platforms
    • Work closely with server, network, and business teams during incident response events to speed remediation
    • Experience working with development teams to build secure solutions
    • Utilize both manual methods and automated tools to identify and assess web application and network vulnerabilities
    • Address, review and resolve reported user issues associated with security platforms
    • Evaluate / recommend technologies that could improve current systems and ensure that plans for security technologies integrate with technical infrastructure
    • Experience breaking down complex systems and applications to find relevant security risks
    • Significant experience with industry known common vulnerabilities and attack vectors
    • Experience in management and tactical usage of 3rd Party SaaS security solutions
    • Experience with enterprise disaster recovery and business continuity planning
    • Experience in working with external auditors
    • Knowledge of common web application and mobile frameworks
    • Knowledge of ubiquitous encryption technologies (PGP, SSH, SSL, etc.) and common protocols (RADIUS, LDAP, KERBEROS, SAML, etc.)
    • Relevant knowledge and/or hands-on experience or working knowledge in the following areas:
    • Network segmentation and isolation techniques and strategies | VPN | Security Information and Event Management | Identity and Access Management | Multi-Factor Authentication | Encryption methods and technologies (data at rest/in transit) | Public Key Infrastructure | Network (wired and wireless) Security | Intrusion Detection (within and from outside the perimeter) | Data Loss Prevention | Mobile Device Management | Denial of service mitigation strategies and supporting technologies | Patch Management technologies | Content Filtering | Network and Host Firewalls | Privileged Account Management | File Integrity Management | Web Application Firewalls | Cloud Access Security Broker | EndPoint Security | Network Access Control | Security Scanning – Network, Web Application | Network Scanning | Data Classification  


    • Bachelor’s or higher degree in computer science, information systems, computer engineering, or a related discipline
    • 4+ years of progressive experience in security centering on: developing, architecting, and implementing of enterprise IT security solutions
    • Ability to prioritize tasks, operate in a fast-pace environment and can handle the
    • Proven ability to support complex/large enterprise IT ecosystems
    • Proven ability to translate business requirements to technology architecture plans
    • Proven experience with application and functional teams across the business to encourage a security mindset throughout software development lifecycle from concept to testing and implementation
    • Active professional certifications:  CISSP
    • Other certifications recognized but not required GSEC, CEH, CRISC, CGEIT, ITIL, GRCP
    • Previous experience with PCI, SSAE16, and other compliance frameworks
    • Strength in both business and technical requirements analysis
    • Strong ability to manage tasks; schedule and organize priorities
    • Strong written and verbal communication skills (documenting concepts, designs, presenting to groups)
    • Possess a strong technology background with the ability to challenge or validate technology decisions from a position of knowledge and experience
    • Possess the ability to rapidly assimilate business strategies, coupled with the insight to seize high impact opportunities by applying creative problem solving solutions
    • Track record of managing across multiple global locations, with a solid understanding of the challenges and benefit
    • Experience in working with highly confidential and sensitive information
    • Experience in operating in a demanding and complex environment
    • Experience in achieving goals through partnership and collaboration
    • Have a proven track record of executing on a strategic technology roadmap
    • Ability to interact with personnel on all levels to resolve issues and provide solutions in a timely manner
    • Strong customer service skills – Delivering security as a service to internal customers
    • Possess a “CAN-DO” approach to work and understands teamwork is essential to achieving goals


    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed