Assist in the maintenance of current security systems.
Monitor reports, systems, logs and alerts for suspicious activity.
Report suspected security violations, threats or inappropriate network actions, in accordance with established response procedures.
Conduct security assessments through vulnerability testing and risk analysis and assist with technical solutions to mitigate security vulnerabilities and automate repeatable tasks.
Identify, track, investigate and report on variety of high priority risks, threat and malicious events affecting TPI assets.
Analyze and remediate security threats from a wide range of technologies.
Analyze security breaches to identify the root cause.
Conduct initial investigation of suspicious activity and escalate incidents, when necessary, and document incident details.
Verify the security of third-party vendors and collaborate with them to meet security requirements.
Assist in performing system audits against hardening standards and baseline controls.
Assist in the identification of information risk and documentation of risk analysis and assessments.
Recommend ways to control or reduce information risk.
Requirements and Qualifications
Strong analytical writing and communication skills and an ability to synthesize complex information from various sources.
Ability to manage ambiguity and help shape the strategic direction of new programs.
Experience designing, building or testing web and API-based architectures.
Expertise in cyber security, firewalls, endpoint security, Intrusion Prevention Systems (IPS), network security, proxy servers, Linux, UNIX, Security Information and Event Management (SIEM), Data Loss Prevention (DLP), application security, security architecture.
Ethical hacking aimed to expose weak points and identifying potential threats (e.g. penetration testing) so that the organization can protect itself from malicious hackers is a plus.
Desired Candidate Profile
Bachelors degree in Business, Data Science, Security Management, Computer Science, Mathematics or related field
6+ years of experience as an information security systems analyst or security operations analyst
Experience scripting in common languages (e.g. Ruby, Python)
Foundational certification such as Network+, Security+, CySA+, Microsoft Certified System Administrator
Industry leading certifications such as GCIA and GSEC are a big plus
Experience with vulnerability risk and impact assessment, scripting languages for parsing and data analysis
Experience and knowledge of IT practices including information security, networking, event management, access management, authentication and security scans
Knowledge of technologies such as SQL, Oracle, Linux, Windows Server, Firewalls, Network technologies, Active Directory, VPNs, Data Loss Prevention tools, etc.
Perks and Benefits
We are a leading wind-blade manufacturer and accounted for approximately 18% of all sold onshore wind blades on a MW-basis globally in 2019. We reached a new high this year with over $1.4 billion in net sales and more than 9,500 wind blades sold. We enable many of the industrys leading wind turbine original equipment manufacturers (OEMs), who have historically relied on in-house production, to outsource the manufacturing of some of their wind blades. We are headquartered in Scottsdale, Arizona, and we have expanded our global footprint to include domestic facilities in Newton, Iowa; Warren, Rhode Island; and Santa Teresa, New Mexico and international facilities in Dafeng, China; Taicang Port, China; Yangzhou, Jiangsu, China; Kolding, Denmark; Chennai, India; Juarez, Mexico; Matamoros, Mexico; and Izmir, Turkey.
Upload CV to get Started
or drag and drop your CV here
(Please upload a doc, docx or pdf file)
Please upload a pdf, doc, docx or txt document less than 2 MB in size.