The Global Information Security (GIS) group provides services and solutions to protect the value and use of Disney’s information through risk evaluation, collaboration, standardization, enforcement, and education across the enterprise. We protect the brand and reputation while enabling and supporting business objectives.
GIS teams are located in Seattle, Burbank, and Orlando.
In order to ensure that our services keep TWDC secure, we follow an ongoing, iterative process, including continued reevaluation of our services over time to address emerging threats as well as changes in business and technology.
The Security Architecture & Engineering team develops and guides technology risk management in collaboration with teams across the company to enable responsive, secure and cost effective solutions. We are a highly versatile and technical team, gleaning from network engineering, application security, data protection, cloud, architecture, risk assessment and control alignment. We are a team of security pros that are here to:
Evaluate solutions and architectures to assess qualitative and quantitative risk
Identify solutions to reduce risk and enhance our prevention and detection capabilities
Conduct threat modeling
Drive cross functional and strategic programs across Data Protection and Cloud Security
The Staff Security Engineer, Security Architecture and Engineering is responsible for evaluating a myriad of deployment scenarios (e.g. on-premises, cloud, hybrid), services, models and technology to ensure they are secure and compliant across the Walt Disney Company (TWDC). This role is highly versatile and technical, gleaning from heavy network engineering, application security and DevSecOps.
Key responsibilities:
Regularly interacts with internal and external customers on security-related projects and operational tasks, and prepares/conducts briefs to senior staff members and executives on a regular basis
Provides situation based analysis and support, using in-depth knowledge of TWDC technology, to ensure systems are designed in accordance with and are aligned with Company security requirements
Creates, reviews and presents reports, position papers, assessment recaps to team, other teams and executives
Executes and leads advanced risk and threat analysis activities, leveraging learnings from external and internal cyber trends and incidents
Develops and documents technical solutions that meet specifications and impact future developments (position papers, process flows, requirements, data flows, mapping to controls)
Identifies, selects, develops and documents architecture artifacts (reference architectures, standards, policies, reusable designs, best practices)
Researches, learns and assesses new technologies
Identifies issues, leads discussions and documents solutions
Responsible for tracking and reporting weekly status updates on work in progress
Understands business drivers and processes to evaluate risk and recommend solutions with a balanced result
Promotes awareness of applicable security policies and standards and implements/coordinates remediation required by audits as necessary
Assists with the maintenance of metrics and scorecards in support of the Information Security Program
Knows and evaluates current policies to provide risk analysis and implementation guidance
8 years experience with 3 or more areas including: public cloud, secure application development, virtual network, big data, elastic compute, cloud security
3-5 years of practical cloud information security experience
Experience in information management and information technology security design and implementation
Demonstrated experience with security event logs from Windows, Unix, intrusion detection systems, network, and remote access solutions
Experience managing IDS / IPS / firewall systems in distributed/hybrid cloud environment
Demonstrated experience in creating conceptual, logical and physical security diagrams, Thorough understanding of vulnerabilities and countermeasures.
Information Security technology/compliance experience.
Detailed understanding of TCP/IP and related communication protocols, Windows authentication mechanisms (Kerberos, NTLM, AD), networking technologies, software defined computing, containerization, routing and switching, big data, elastic compute, and risk analysis and risk management methodologies
Ability to manage multiple priorities and work effectively in a fast-paced, high volume, results driven environment
BA/BS in Business or Computer Science or appropriate work experience
Masters or other advanced degree preferred
Job ID: 125646
This position will be responsible for the day-to-day operation and repair of pum...
Ihr Aufgabengebiet:- Durchführen von Prüfungen im Labor ...
Are you looking to make an immediate impact where you can help our clients solve...
As the Plant Controller you will manage the execution of all RPO operational Fin...