Sr. Information Security Engineer

Providence, RI, US, 02903

IGT

IGT is the global leader in gaming. We deliver entertaining and responsible gaming experiences from Gaming Machines and Lotteries to Sports Betting and Digital

View company page

IGT (NYSE:IGT) is a global leader in gaming. We deliver entertaining and responsible gaming experiences for players across all channels and regulated segments, from Lotteries and Gaming Machines to Sports Betting and Digital. Leveraging a wealth of compelling content, substantial investment in innovation, player insights, operational expertise, and leading-edge technology, our solutions deliver unrivaled gaming experiences that engage players and drive growth. We have a well-established local presence and relationships with governments and regulators in more than 100 countries around the world, and create value by adhering to the highest standards of service, integrity, and responsibility. IGT has approximately 10,500 employees. For more information, please visit www.igt.com.

Overall Objective and Purpose


Responsible for providing consultative, technical research and analytical support in one of the following areas of information security: 

  • Assessments for site related effort, either jurisdiction or enterprise locations
  • Trends, standards, best practices, concepts and solutions 
  • Product design, selection, configuration, hardening, optimization, and maintenance
     

Principle Duties and Responsibilities

 

  • Assists Manager in providing for the safekeeping and integrity of enterprise assets by maintaining systems and controls that prevent unauthorized access, modification, disclosure, and/or deletion of information from production systems networks and resources. 
  • Directly interfaces with business line technical experts to provide guidance on authorization, authentication, and encryption solutions.
  • Consults with business units regarding their changing business and technical plans to ensure that information security issues are addressed early in the project life cycle.
  • Understands the ISMS policy and procedures and is able to use that knowledge to provide insight when assessing and configuring security tools. 
  • Advises Manager of changes in technical, legal and regulatory arenas affecting information security and computer crime.
  • Provides advocacy during the design and development of network security focusing on firewalls, Intrusion Detection Systems, Digital Signatures, Certificate Authorities, PKI’s, encryption schemas, routers, and centralized authentication and access control software.
  • Provides security alerts on hardware/software as they become available.
  • Monitors and alerts on changes in hardware, software, telecommunications, facilities, and user requirements for enterprise to ensure that security is not compromised or degraded.
  • Supports audit activity associated with enterprise tool compliance management 
  • Leads the design & establishment of the Information Security Management System
  • Leads maintenance and assessment of ISMS as pertains to enterprise.
  • Serves as a security technical analyst and advisor on company initiatives to evaluate new technology resources for program compliance by effectively testing solutions using industry standard evaluation criteria, which includes the delivery of formal papers and technical reports on test results and findings.

Scope

 

  • Complexity: Functions Responsible for or Influenced
    • High – Influence on Information Security across the organization
  • Diversity: Locations Responsible for or Influenced
    • High - Influence on enterprise
  • Typical Job Problems and Difficulties
    • Ensuring the security of the company’s security policy across multiple sites, platforms and customers
  • Financial Accountability

General

 

  • Extent decisions governed by procedures or referred up
    • Low - some actions are dictated by policy / procedure or complex issues must be escalated to management for resolution
  • Standard requirements for research and analysis
    • Provides security architecture research and analysis in a liaison capacity to all areas of technology development & infrastructure within any Systems Solutions & Delivery organization.  
  • Opportunity and consequence of typical errors (supervision)    
    • Frequent with high impact – systems are used globally
  • Frequency and complexity of internal business contacts
    •  Frequent with high complexity – deal with business issues on a daily basis
  • Frequency and complexity of external business contacts
    • Networking with agencies and CSIRTs outside the organization to stay abreast of threats and countermeasures.
  • Physical (% time: travel, operating machinery, environmental etc.)

Education

 

  • Minimum education 
    • Bachelor’s degree in Computer Science or related field
  • Years Experience
    • 5 years experience in information security

    

  • Essential special training requirements
    • CISSP certification desired, SANS - GIAC certification is a plus. 
    • Proven and demonstrated accomplishments in the Information Security field. Member of various Information Security Organizations (i.e., ISSA, SANS, ISC2, ESF, etc.) preferred.
  • Other skills
    • Excellent verbal and written communication skills
    • Must have excellent project management skills, including the ability to plan, organize, & prioritize multiple projects to ensure target dates & goals are achieved.
    • Experience with Networking Security,; practical experience with firewalls; perimeter protection, virtual private networks (VPN); intrusion detection in depth; advanced incident handling and forensics practices.
    • Working knowledge of graphic applications used for flow-charting and infrastructure depiction such as Visio and demonstrated ability to produce high quality documentation.

Keys to Success

 

  • Building collaborative relationships
  • Decision making
  • Drive results
  • Foster innovation
  • Personal energy
  • Self-leadership

#LI-DAK

IGT is committed to sustaining a workforce that reflects the diversity of the global customers and communities we serve, creating a fair and inclusive culture that enables all our employees to feel valued, respected and engaged.  IGT is an equal opportunity employer. We provide equal opportunities without regard to sex, race, color, religion, age, national origin or ancestry, disability, veteran status, sexual orientation, genetic information, gender identity or expression, and any other personal attributes protected by federal, state, or other laws. We thank all applicants for applying; however, only those selected to interview will be contacted.

 

At IGT, we consider a wide range of factors in determining compensation, including background, skills, experience, and work location. These factors can cause your compensation to vary. The estimated starting compensation range is $123,100 - $240,500. The actual pay offered may end up being higher or lower. The Company will comply with all local pay requirements and collective bargaining agreements, where applicable.

 

Base pay is only one part of our Total Rewards program.  Sales roles may be eligible for commission payments, while other roles are eligible for discretionary bonuses .  In addition, we offer employees a 401(k) Savings Plan with Company contributions, health, dental, and vision insurance, life, accident, and disability insurance, tuition reimbursement, paid time off, wellness programs, and identity theft insurance. Note: programs are subject to eligibility requirements.

 

IGT (NYSE: IGT) is the global leader in gaming. For more information, please visit www.igt.com.

Apply now Apply later
  • Share this job via
  • or

Tags: CISSP Compliance Computer crime Computer Science Encryption Firewalls Forensics GIAC Intrusion detection ISMS Network security PKI SANS VPN

Perks/benefits: Career development Health care Insurance Startup environment Wellness

Region: North America
Country: United States
Job stats:  5  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.