Equal Opportunity Employer: Minority/Female/Disability/VeteranWaste Management (WM), a Fortune 250 company, is the leading provider of comprehensive waste and environmental services in North America. We are strongly committed to a foundation of operating excellence, professionalism and financial strength. WM serves nearly 25 million customers in residential, commercial, industrial and municipal markets throughout North America through a network of collection operations, transfer stations, landfills, recycling facilities and waste-based energy production projects.To enable our business to expand our lead in a market increasingly enhanced by technology, Waste Management is undertaking a substantial technology transformation. We are seeking talented Information Technology professionals to join the Waste Management team who are motivated to help us transform the way we design, build and use technology. With your skills and experience, we look for you to combine your technical expertise with industry best practices in an effort to align information technology solutions with Waste Management business strategy.Job SummaryRecognized across the organization for functional expertise. Manages events generated by endpoint clients, servers, network devices, and security devices across the enterprise. Responds in investigations of possible incidents using a log/event management tool. Provides the highest level of engineering support across the IT Security portfolio of tools.Duties and Responsibilities include the following: To perform this job successfully, an individual must be able to perform each duty satisfactorily. Other ancillary duties may be assigned.Provides day-to-day management of security technologies utilized to protect WM’s data and networks. These technologies include SIEM, Anti-Virus, Data Loss Prevention, Intrusion Prevention, Proxy, and Encryption.Participates in WM’s Information Security Office leadership team to drive innovative security solutions, and collaboration with other IT and global functions.Manages security audit and intrusion detection system logs for system and network anomalies and provides highest level analysis.Responds to unique, highly complicated, suspicious or malicious events detected through collection or reported by Help Desk or users.Provides technically advanced remediation and application event support to IT operations and engineering teamsPerforms initial computer system forensic investigations and supports fraud investigations.Provides top level analysis, design and support for log collection of firewalls, routers, networks and operating systems.Communicates technical and event assessment results, evaluates engineering and integration initiatives and provides technical expertise to assess security policies, standards and guidelines.Develops, collects and analyzes logs from firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools.Reviews and recommends the installation, modification or replacement of hardware or software componentsIdentifies and addresses any configuration change(s) that impact event collection.Off hours support required due to the 24×7 nature of this team.Supervisory Responsibilities: Will coach and mentor less-experienced analysts and act as team leader on more complicated systems projects.Qualifications:Required: Bachelor’s Degree in Computer Science, MIS, Business Administration or similar area of study. Seven years of previous experience required. Four years of related experience may substitute for the Bachelor’s degree.Preferred: Bachelor’s Degree and at least seven years of experience in network, host, data and/or application security in multiple operating system environments.Certificates, Licenses, Registrations or Other Requirements. One or more of the following is required:Certified Information Systems Security Professional (CISSP).Certified Information Systems Auditor (CISA).Certified Information Security Manager (CISM).Preferred: Other professional certifications desired include: CWSP, GIAC.Other vendor certifications desired include: CCNA, CCNP, CCSP, MSCEOther Knowledge, Skills or Abilities Required:Technically advanced or in-depth knowledge or skills in one or more of the following is required:Fortune 500 experienceExpert knowledge of information security technologyMust have expert technical proficiency in multiple information security tools, including anti-virus, log collection, encryption, network security tools, intrusion prevention systems, and data loss preventionMust have high proficiency in investigative practices and procedures (forensics knowledge is a plus).Other Knowledge, Skills or Abilities that Contribute to Success:May require technically advanced or in-depth skills in one or more of the following:Previous Criminal Justice experience.Ability to create and deliver presentations targeted to either end users or senior management.Highly technical across a broad range of computing platforms and network protocols.Experience in several or more of the following technologies: Firewalls, Vulnerability Scanning, Email Security, DNS, Certificate Authority.Understanding and experience with IP address space management, subnetting, name resolution, and directory service protocols and be able to participate and guide future network LAN/WAN planning and implementation.Familiarity with key security models and regulations such as ISO 2700X, SOX and PCI.Ability to support both internal and external audits.Experience in the areas of change control, problem management, incident management troubleshooting of security solutions.Ability to handle successfully multiple projects at one time.Strong communicator both written and verbally.Actively participate in professional organizations such as ISSA, ISACA, and InfraGard.