* 3-7 years of progressive experience in information technology * 3-5 years of progressive information security experience across 2 or more information security / information technology risk management domains such as but not limited to: * Network Security * Must be able to deploy IPS/IDS including sensors and ensure they are reporting to central console. * Host/Endpoint Security * Must have experience with desktop OS including Windows 7 / Windows 10 / Windows Server 2008 Must understand UAC, Windows processes and NTFS * Data Security * Understand how data is identified or de-identified and how DLP works * Vulnerability Management * Must be able to deploy remote scanners, set up different types of scans and compile reports in graphs and pivot tables. Must be able to validate and enumerate vulnerabilities found in the scanning. * Deep knowledge of TCP/IP protocols including routing and subnetting. Must know the differences between private and public IP’s address. * Knowledge of MFA (Multi-Factor Authentication), including set up of the console, provisioning tokens and troubleshooting issues. * Understand SIEM including implementation, hardware maintenance and onboarding log sources. * Understand how Proxy works including whitelisting and agent troubleshooting * Understand how MTA filters e-mail and force it SMTP through appliance * In depth knowledge of HIPAA regulatory requirements and HiTrust CSF. * Excellent technical aptitude, resourcefulness, and critical thinking skills. * Ability to identify security risks and weaknesses and provide security mitigation and remediation recommendations. * Demonstrated experience and expertise with multiple security controls within multiple security domains. * Ability to think strategically with strong attention to detail. * Must possess strong written and verbal communication skills. * Experience working with global teams across multiple time zones, cultures and languages. * Bachelor’s Degree in Computer Science, Engineering or related field or equivalent work experience required. * GIAC, CISSP, CISM, or other relevant information security industry recognized certification preferred.