Sign up for our
weekly
newsletter
of fresh jobs
Let's search for your next career at TEL. Use the form below to search our current opportunities and then apply. Please consider joining our Talent Community so that we may continue to engage with you. Job Description Introduction Tokyo Electron US Holdings, Inc. is searching for an accomplished information security professional to join its Information Security Department. The position requires frequent, close collaboration with US-based enterprise leadership, business units with unique technical needs, experts in the Information Systems Department, and international department personnel. We seek a professional who demonstrates exceptional analytical, communication and technical skills related in general to information technology and specifically to information security. The successful candidate's employment level will correspond to a combination of his/her education level, years of experience, certifications as well as skills and knowledge relevant to the position. Job Description Develop and advocate information security educational resources and solutions that promote resilient security culture throughout the enterprise. Support the establishment, implementation, documentation, and adherence to information security standards to protect essential company information assets systems, services and sites. Understand the risk associations within and across the following areas: people, processes, applications, data stores, platforms, networks and physical components. Use this understanding to assess the probability and impact of relevant risks as well as design, test and implement risk mitigating solutions, including security policies, processes and technologies. Develop enterprise strategy for security awareness training, facilitate, promote and support the delivery of effective content, and demonstrate effectiveness via metrics and change over time. Training may generally apply to all members of the workforce, including employees and third-party workers. Training may also be targeted to roles and personas , including worker level (e.g., executives, managers, individual contributors), worker role (e.g., technology enablers and administrators) or department (e.g., factory, R&D). Assist communications strategy for the incident response management program. Areas of focus include planning, program development, documentation, knowledge sharing, coordination with participating teams, response (e.g., containment, eradication) and recovery as well as any necessary post-incident activities. Research and recommend security solutions to the Information Security Department and business leaders, contributing to program maturity and continuous improvement. Abilities and Skills Self-motivation, self-direction, keen eye for detail and a willingness to take ownership of tasks to advance the organization's security objectives. Excellent written, verbal and non-verbal (i.e., interpersonal) communication, presentation and public speaking ability, as well as listening and collaboration skills. Strong business acumen with the ability to analyze and understand international business issues, then relate them to information security risks, threats and controls. Ability to communicate security and risk-related concepts with audiences of varied technical and business backgrounds. Persuasive content creation abilities in written, graphical and presentation media. Team-oriented and skilled in working in an international, collaborative environment. Ability to develop positive relationships and effectively communicate with stakeholders, including international management, software / system / security architects, software / system / security engineers, quality assurance, auditors, legal, compliance as well as information system or security operations personnel. Ability to organize personnel training and design curricula that promote enterprise security skills, best practices and culture. Ability to rapidly learn and apply new technologies, methods and processes and conduct research into information security issues and products as required. Analytical research skills with the ability to make recommendations based on business requirements and evidence-based approaches. Inquisitive, adaptable, flexible and driven to execute results in rapidly changing environments. Adept at navigating ambiguity, shifting tactics and priorities to address contemporary risks and technological issues. Effective prioritization and execution of tasks in a sometimes high-pressure environment. Persuasive, encouraging, motivating and inspiring in the company-wide effort to solve complex security problems. Project management, financial / budget management, scheduling and resource management. Knowledge and Experience Demonstrated understanding and working mastery of security-related concepts, technologies and practices, including authentication and authorization systems, endpoint protection, encryption, segmentation strategies, vulnerability management and secure remote access. Knowledge of the interaction between 1. layered information systems (process, application, data store, platform, network and physical asset controls), 2. information risks and 3. an overarching management methodology. Strong / diverse background in enterprise information technology, such as networking, firewalls, storage options, server infrastructure, operating systems, database technologies, desktop operating systems and information related fields both technical and non-technical. The basic tenets of enterprise risk management (i.e., threat management, vulnerability management and risk treatment). Knowledge in analyzing, recommending, & developing enterprise-wide security standards, policies, procedures and guidelines within appropriate risk tolerances. Certifications One or more of the following certifications as a holder in good standing is preferred: Certified Public Accountant (CPA) Certified in Risk and Information Systems Control (CRISC) Certified Information Systems Security Professional (CISSP) Certified Information Systems Auditor (CISA) Certified Information Systems Manager (CISM) Global Information Assurance Certification (GIAC) CompTIA Security Certified Ethical Hacker (CEH) SANS Security Awareness Professional (SSAP) Similar information security or internal control-related certifications. Selection Criteria At least six years of combined professional and / or educational experience in information technology, computer science, business administration, security risk and compliance management, security operations, incident response management, auditing, research, analytics and / or consulting. Graduation from an accredited four-year college or university with major coursework in one or more fields above or equivalent certification level. Familiarity with security awareness training tools and concepts, including phishing simulations, is desirable. Experience researching, authoring or supporting development of information security or other risk mitigation related policies, solutions and processes. Background in process improvement and user experience, with emphasis on advancing efficiency and simplicity as benefits to information security. Experience developing security and risk, or other, performance metrics as well as reporting dashboards for executive, business and technical audiences. Work Conditions 40 hour on-site / remote work week with on-call availability required (e.g., incident response). Frequent weekly web conferences with global audiences outside normal work hours. 5-20% domestic / international travel expected during normal times. Domestic / international travel is not typically expected during periods of COVID-19 related travel restrictions. Sitting / standing at a desk for extended periods of time. Extended, high intensity periods can be expected, depending on business situations. Sufficient dexterity of hands and fingers to efficiently operate a computer keyboard, mouse and other computer components. Lifting and transporting of moderately heavy objects, such as computers and peripherals may be required, but is not typically expected. Salary Ranges Individual pay is determined based on multiple factors, including but not limited to location, experience, skills, job-related knowledge, relevant education, certifications, and/or training. In addition to base salary, we offer (full time regular employees ) a comprehensive benefits package and for certain roles eligibility in our bonus plan and long-term incentives as applicable. The talent advisor can share more details about total compensation for the role in your location during the hiring process. Diversity creates an innovative culture. TEL US is an Equal Employment Opportunity / Affirmative Action employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, national origin, protected veteran status, disability status, sexual orientation, gender identity or expression, marital status, genetic information, or any other characteristic protected by law. SubsidiaryTOKYO ELECTRON U.S.HOLDINGS, INC.