Primary Activities and Responsibilities
- Identify and communicate risks to Technology owners to promote a robust cyber risk management program allowing CSX to proactively triage and remediate flaws in Information Technology and Operational Technology systems.
- Conduct active and passive penetration testing on Information Technology and Operational Technology environments.
- Engage with Technology and Engineering teams to explain results and provide guidance on remediation of identified vulnerabilities.
- Lead the Vulnerability Management activities within the Information Security Working Group, a cross functional team of Technology Operations and Applications team members responsible for reducing the cyber-attack surface of CSX systems.
- Coordinate testing efforts of external red teaming and penetration teams engaged by CSX.
- Research, evaluate, design, test, recommend or plan the implementation of new or updated information security hardware or software, and analyze its impact on the existing environment; provide technical and managerial expertise for the administration of security tools.
- Manage production issues and incidents and participate in problem and change management forums.
- Assist with the resolution of negative audit findings reported by internal or external auditors.
Knowledge and Skills
- Network penetration testing and manipulation of network infrastructure
- Mobile and/or web application assessments
- Shell scripting or automation of simple tasks using Python.
- Developing, extending, or modifying exploits, shellcode, or exploit tools.
- Knowledge of application technology security testing (white box, black box and code review)
- Adheres to and improves upon company Information Security policies and procedures; mastery of core technical concepts; supports and assists in response to security events and escalations; may provide disaster recovery support; responsibilities may extend beyond day-time business hours, including on-call rotation.
- Technical agility and strong analytical skills.
- Knowledge of mainstream operating systems (for example, Microsoft Windows and Linux) and a wide range of security technologies, such as network security appliances, identity and access management systems, anti-malware solutions, automated policy compliance and desktop security tools
- Knowledge of network infrastructure, including routers, switches, firewalls and associated network protocols and concepts.
- Strong written and verbal communication skills
- Strong analytical skills