Demonstrated knowledge and experience implementing, monitoring, and upgrading security technology and administrative controls necessary to safeguard computer information data and systems Detailed knowledge of system security vulnerabilities and remediation techniques, including penetration testing and the development of exploits as well as have strong background in troubleshooting of operational issues and incident handling. Responsible for ensuring Information technology meets financial and Meaningful Use audit mandates as well as Governance, Risk and Compliance (GRC) mandates. Responsible for administration of security tools to maintain security controls, including firewalls, intrusion detection systems, NAC, SIEM, and data loss prevention technologies. | 5+ years’ experience in security administration experience in a large, complex environment. Enterprise class security products such as such as web proxy, reverse proxy, load balancing, IDS/IPS, DLP, Firewall, IPsec/SSL VPN, WAN/LAN, DDOS prevention, wireless and remote connectivity. Infrastructure security, including windows, Unix/Linux, desktop/laptop, and mobile security, hands-on experience in packet capturing and analyzing log, as well as knowledge on cryptography and PKI. Compliance frameworks and requirements such as PCI, HIPAA, HITECH, SOX etc. Knowledge on threat landscape, security threat and vulnerability management, and security monitoring and analytics | 7 years’ experience in security administration experience in a large, complex environment. Enterprise class security products such as web proxy, reverse proxy, load balancing, IDS/IPS, DLP, Firewall, IPsec/SSL VPN, WAN/LAN, DDOS prevention, wireless and remote connectivity. Infrastructure security, including windows, Unix/Linux, desktop/laptop, and mobile security, hands-on experience in packet capturing and analyzing log, as well as knowledge on cryptography and PKI. Compliance frameworks and requirements such as PCI, HIPAA, HITECH, SOX etc. Knowledge on threat landscape, security threat and vulnerability management, and security monitoring and analytics |