hero

Portfolio Jobs

Discover opportunities across our network of portfolio companies

Information Security Professional

Cobwebs Technologies

Cobwebs Technologies

IT
Lincoln, NE, USA
Posted on Feb 15, 2025

Information Security Professional

  • IT
  • Lincoln

Description

Penlink is a technology company bringing clarity to complex data for people who need it now. We partner with law enforcement agencies across the United States, offering a software solution to manage data and aid investigators solving crimes. It sounds like a lot of data and analytics, but really, it’s about improving the world and keeping safe the places we call home.

We are seeking a motivated and skilled Mid-Level Information Security Professional to join our corporate security team. This individual will play a crucial role in enhancing our security posture, managing vulnerability assessments, overseeing identity and access management, and supporting our incident response efforts.

The ideal candidate will possess hands-on experience with security tools and technologies, particularly in the areas of Cloud Security Posture Management (CSPM), and a strong understanding of compliance requirements.

LOCATION: Qualified candidates must reside within commuting distance of Lincoln, NE.

RESPONSIBILITIES:

• Conduct regular vulnerability assessments, prioritize remediation efforts, and collaborate with cross-functional teams to mitigate security risks.

• Manage user access controls, conduct audits, and implement IAM policies to ensure secure access to systems and data.

• Experience with configuring, monitoring, and troubleshooting firewalls to enhance the organization's security posture

• Assist the incident response team in identifying, investigating, and responding to security incidents. Contribute to post-incident reviews and improvements in processes.

• Monitor security systems and alerts to identify potential threats. Analyse security incidents and propose solutions to enhance overall security effectiveness.

• Utilize Cloud Security Posture Management tools to assess and manage security configurations in cloud environments, ensuring compliance with security best practices and regulatory requirements.

• Collaborate with third-party vendors or internal teams to conduct penetration tests and vulnerability assessments, analyzing results and recommending remediation.

• Maintain comprehensive documentation of security incidents, vulnerability assessments, and IAM activities. Prepare reports for management to communicate security risks and initiatives.

• Work closely with IT, Operations, and development teams to implement the best security practices and provide guidance on security-related issues.

• Understand the technical requirements and controls associated with SOC 2 and ISO 27001 standards to ensure compliance and support audit processes.

• Work with the compliance team to collect evidence necessary for audits and assessments related to SOC 2 and ISO 27001 compliance.

• Participate in internal and external security audits, ensuring compliance with regulatory requirements and industry standards.

• Stay up to date with the latest security trends, technologies, and threats, and recommend improvements to the security infrastructure based on this knowledge.

Requirements

• Hands-on experience (typically 4-6 years of relevant experience)

• 4-5 years of hands-on experience in information security, with a focus on vulnerability management, IAM, and security monitoring.

• Ability to educate employees about security policies and best practices to foster a culture of security awareness within the organization

• Advantage: Bachelor’s degree in computer science, Information Security, or a related field.

• Knowledge of security frameworks and standards (e.g., NIST, ISO 27001, SOC 2).

• Familiarity with CSPM tools (e.g., Prisma Cloud, Wiz, or similar).

• Proficiency in Endpoint Detection and Response (EDR) management, with a preference for experience with CrowdStrike, along with experience using security monitoring and incident response tools (e.g., SIEM solutions) for proactive threat detection and response.

• Experience with firewall management and network security, with a preference for experience with Fortinet products.

• Strong background in Mobile Device Management (MDM) and access control, with experience in managing security for both mobile and desktop devices across diverse environments.

• Relevant hands-on certifications such as Certified Ethical Hacker (CEH), CompTIA Security+, Certified Information Systems Security Professional (CISSP), AWS Certified Security – Specialty and Microsoft Certified: Azure Security Engineer Associate are preferred.