Information Security Services is responsible for providing shared services that safeguard Energy Transfer's business and assets in a digitally connected world by identifying and mitigating Cyber Security risks. We also administer and operate our cyber security controls in both IT and OT environments. Essential Duties & Responsibilities: Acts as a technical consultant for the enterprise, ensuring security design for systems align with business needs, network architecture and technical standards. ... more details
Are you interested in joining our team? Chat with our digital assistant to learn more about our company and apply right from your mobile device! Text ETP to 25000 to get started or apply through this web posting if you prefer.
Energy Transfer, recognized by Forbes as one of America's best large employers, is dedicated to responsibly and safely delivering America’s energy. We are driven to inspire our employees to create superior value for our customers, our investors, a sustainable future and giving back to the community where we have long-standing commitments to causes including MD Anderson Children’s Cancer Hospital, The Salvation Army, American Heart Association, Ronald McDonald House and many more.
We value all of our employees who make our growth and success possible. We are proud to offer industry leading compensation, comprehensive benefits, 401(k) match with additional profit sharing, PTO and abundant career opportunities.
Come join our award winning 11,000 strong organization as we fuel the world and each other!
Summary: Information Security Services is responsible for providing shared services that safeguard Energy Transfer's business and assets in a digitally connected world by identifying and mitigating Cyber Security risks. We also administer and operate our cyber security controls in both IT and OT environments.
Essential Duties & Responsibilities:
Acts as a technical consultant for the enterprise, ensuring security design for systems align with business needs, network architecture and technical standards.
Monitor the organization's network infrastructure for any unusual activity or potential security breaches. This involves analyzing network traffic patterns, identifying anomalies, and investigating any suspicious behavior.
Assist in the configuration and management of firewalls to enforce security policies and control the flow of traffic between different network segments. Ensures that firewall configurations align with security best practices.
Assists in incident response and remediation of emerging and ongoing threats
Recommends and assist with the design of network security controls to support the data security needs of systems being developed or acquired.
Confers with users and/or management to define business requirements for complex security development.
Performs end to end full stack reviews of current or incoming technologies for ITSEC compliance.
Creates advisory artifacts and recommendations based upon findings after reviews are complete.
Ensures that proposed and existing network security architectures are aligned with organizational goals and objectives.
Conducts research on emerging technologies in support of systems development efforts, and recommends technologies that will increase cost effectiveness and systems flexibility.
Stays up-to-date on current tools, techniques, and vulnerabilities.
Develops and maintains documented procedures around securing internal systems.
On an ongoing basis, conducts security assessments and audits of IT's application and infrastructure portfolio to identify determine issues, weaknesses and gaps in processes and technology.
Requirements:
Education and/or Experience, knowledge, skills & abilities: To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.
High school diploma or equivalent.
Experience in Security Engineer or Security Architect role
5 - 8 years of related experience
Progressively responsible roles in information security including most, if not all, of the following skills (required):
Proficiency with solutions design, configuration, and implementation.
Strong understanding of network architecture, firewalls, Intrusion Detection Systems, web filtering, audit and log management, physical security control systems, real-time systems, and common operating systems.
Solid understanding of emerging technologies in IT such as a Cloud Platform, Internet of Things and Mobile BYOD as well as the associated security risks.
Understanding of encryption technologies and common network protocols.
Proficiency with Cloud service and deployment models (e.g. CaaS, SaaS, IaaS, and PaaS).
Experience using Cloud-native/Cloud-friendly authentication mechanisms such as OAuth, OpenID, SAML, etc.
Required experience is commensurate with the selected job level:
The Senior IT Specialist level requires a Bachelor’s degree or equivalent experience and 5-8 years of relevant job related experience
The Lead IT Specialist level requires a Bachelor’s degree or equivalent experience and 8+ years of relevant job related experience
The Principal IT Specialist level requires a Bachelor's degree or equivalent experience and 10+ years of relevant job related experience.
Preferred Skills:
A degree in computer science, MIS, engineering or related discipline, and relevant industry certifications (CISSP or other security certifications)
Familiar with Firewall and Proxy administration.
Proficiency in configuring and managing firewalls to control inbound and outbound traffic, enforce security policies, and prevent unauthorized access to network resources.
A solid understanding of network protocols (e.g., TCP/IP, DNS, HTTP) and network architectures (e.g., LAN, WAN, VPN).
Understanding of network access control mechanisms to authenticate and authorize users/devices, enforce security policies, and prevent unauthorized access to the network.
Experience with Cisco’s security suite of products.
ITIL Certification preferred, strong understanding of ITIL tools, processes and terminology a plus.
Experience identifying vulnerabilities in infrastructure and software.
Experience supporting a multi-OS environment (iOS, Android, Windows 10, etc.).
Knowledge of Cyber Security standards and frameworks such as NIST.
Strong analytic and problem-solving abilities.
Excellent written/oral communications and analytical skills.
Excellent interpersonal skills.
Working Conditions: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job:
Usually, normal office working conditions. Must be able to remain in a stationary position 50% of the time due to prolonged periods of sitting or standing. |
Occasional overnight travel may be required.
An equal opportunity employer/disability/vet
Energy Transfer is an equal opportunity employer and does not discriminate against qualified applicants on the basis of actual or perceived race, color, religion, sex, sexual orientation, gender identity, age, national origin, disability, pregnancy, veteran status, genetic information, citizenship status, or any other basis prohibited by law.
The nature and frequency of the above working conditions and requirements may vary depending on individual operational circumstances. Where feasible, the Partnership will make reasonable accommodations to qualified individuals with disabilities to enable them to perform the essential functions of the job.
DISCLAIMER: The statements listed in this job posting, which are subject to change, are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required of personnel so classified.
Job Abstracts is an independent Job Search Engine. Job Abstracts is not an agent or representative and is not endorsed, sponsored or affiliated with any employer. Job Abstracts uses proprietary technology to keep the availability and accuracy of its job listings and their details. All trademarks, service marks, logos, domain names, and job descriptions are the property of their respective holder. Job Abstracts does not have its members apply for a job on the jobabstracts.com website. Additionally, Job Abstracts may provide a list of third-party job listings that may not be affiliated with any employer. Please make sure you understand and agree to the website's Terms & Conditions and Privacy Policies you are applying on as they may differ from ours and are not in our control.
Any time you conduct a search, the system shows you job matches, ranked by their Relevance Score (RS).
The score is calculated by a proprietary algorithm that uses Intelligent Machine Learning.
The Relevance Score tells you how well the job opportunity matches your search term or terms.
When not logged in, the system is limited to one search term. Scores for single term matches are usually lower.
When you register, log in, and set up multiple terms prioritized by importance, the jobs found for you will receive a much higher Relevance Score.