Your Impact
The primary purpose of this role is to provide consultation and technical direction to engineers focused on supporting the design, implementation and ongoing operation of information security tools and services. This includes providing expert direction for effectively translating business requirements and functional specifications into robust enterprise security software solutions that ensure information assets are adequately protected with acceptable levels of control. This also includes facilitating successful monitoring, testing, and evaluation of security assessments of systems and leading the design and implementation of remediation solutions. To be successful, the individual in this role must have advanced knowledge of security practices and tools related to identity and access management along with enterprise digital certificate management systems. This role serves as a technical expert for project teams that establish and maintain programs that enable the business to operate efficiently and remain in compliance with regulatory and industry best practices.
Want more jobs like this?
Get jobs in Charlotte, NC delivered to your inbox every week.
What you will do
- Supports the implementation and maintenance of assigned information security solutions to ensure successful deployment and operation; develops and documents detailed standards (e.g., guidelines, processes, procedures)
- Assists the Information Security team in monitoring security systems, reviewing logs, and managing information security systems
- Participates in regular security vulnerability assessments
- Performs internal and external penetration validation testing to ensure that computer systems are up to date relative to all operating systems, patches, and virus protection software
- Collaborates with other technology teams including Engineering to design and implement remediation solutions
- Provides assistance during information security incidents as part of an Incident Response Team
- Performs security tests against 3rd party products
- Remains aware of technological trends and developments in the area of information security
- Solves difficult technical problems; solutions are testable, maintainable, and efficient
- Provides support in the event of escalated security issues for enterprise systems; helps diagnose, troubleshoot, and resolve issues
- Supports the implementation of hardware and software changes into environments to ensure security requirements are met
- Provides input into security breach response procedures; assists with security breach response activities
- Participates in break/fix activities
- Analyzes the output of industry-standard cybersecurity tools and helps identify remediations to reduce risk and exposure of applications
- Completes basic custom enhancements of applications using secure coding techniques to reduce the threat of remote or local vulnerabilities
- Evaluates entire applications (Container, Infrastructure, host platform) to identify potential threats and vulnerabilities
Required Qualifications
- Bachelor's Degree in Computer Science, CIS, Engineering, Cybersecurity, or related field (or equivalent work experience in a related field)
- 2 Years of experience in technology system support, software development, or a related field
- 1 Year of experience with information security applications and systems
- 1 Year of experience in IAM or Vulnerability Management.
- 1 Year of scripting experience using Python or JavaScript.
Preferred Qualifications
- Master's Degree in Computer Science, CIS, Business Administration, or related field
- 1 year of experience working on project(s) involving the implementation of solutions applying development life cycles (SDLC)
- 2 years of experience analyzing the output of industry-standard cybersecurity tools and identifying remediations to reduce risk and exposure of applications
- Relevant information security certifications (e.g., CISSP, CISM, CEH, PCI ISA, CRISC, CISA, OSCP, GPen)
- Advanced understanding of information security practices and policies
- 2 years of IT experience developing and implementing business systems within an organization
- 2 years of experience working with defect or incident-tracking software
- 2 years of experience with technical documentation in a software development environment
- 2 years of experience working with an IT Infrastructure Library (ITIL) framework
- 2 years of experience leading teams, with or without direct reports
- Experience with Cloud technologies
Where You'll Be;
- Associates are required to relocate to the Charlotte region to foster collaboration and facilitate improved testing and support.
- Lowe's supports a Flex Office concept where in-person work is required two days per week at the Charlotte Tech Hub
- Most business meetings are planned around the Eastern time zone.
About Lowe's
Lowe's Companies, Inc. (NYSE: LOW) is a FORTUNE® 50 home improvement company serving approximately 16 million customer transactions a week in the United States. With total fiscal year 2023 sales of more than $86 billion, Lowe's operates over 1,700 home improvement stores and employs approximately 300,000 associates. Based in Mooresville, N.C., Lowe's supports the communities it serves through programs focused on creating safe, affordable housing and helping to develop the next generation of skilled trade experts. For more information, visit Lowes.com.
Lowe's is an equal opportunity employer and administers all personnel practices without regard to race, color, religious creed, sex, gender, age, ancestry, national origin, mental or physical disability or medical condition, sexual orientation, gender identity or expression, marital status, military or veteran status, genetic information, or any other category protected under federal, state, or local law.
Pay Range: $75,300.00 - $143,100.00 annually Starting rate of pay may vary based on factors including, but not limited to, position offered, location, education, training, and/or experience. For information regarding our benefit programs and eligibility, please visit https://talent.lowes.com/us/en/benefits.