Security Engineer – PKI – Marriott International HQ – USA

APPLY HERE

Job Number 20023980
Job Category Information Technology
Location Marriott International HQ| 10400 Fernwood Road| Bethesda|
Maryland| United States
Brand Corporate
Schedule Full-time
Relocation? No
Position Type Management

Start Your Journey With Us
Marriott International is the world’s largest hotel company| with more brands|
more hotels and more opportunities for associates to grow and succeed. We
believe a great career is a journey of discovery and exploration. So| we ask|
where will your journey take you?

JOB SUMMARY

This position serves as a Public Key Infrastructure (PKI) subject matter
expert for the Global Information Security division. It focuses on the
administration| operation| upgrade and support of the on-premise & on-cloud
Entrust Certification Authorities (CA)| the on-cloud Entrust Public CA (ECS)|
and the on-cloud KeyFactor Command tool. The position’s other duties include
certificate provisioning| troubleshooting certificate installation and
configuration| documenting current and new PKI processes| and monitoring the
PKI ServiceNow request queue. The position works with other PKI experts to
fulfill PKI objectives| assignments| and projects. The position shares
rotational on-call duties. The candidate shall be experienced with creating
specifications (e.g. requirements) and testing software for accuracy and
reliability. The candidate must be customer service friendly| and performs
well both individually and in a team environment.

CANDIDATE PROFILE

Education and Experience

Required:

Bachelor’s degree in Computer Sciences or related field or equivalent experience / certification
3+ years of experience in the PKI management including SSL certificate lifecycle managements| expiration communications| and troubleshooting| as well as PKI management process improvements
3+ years of experience supporting and managing Entrust PKI solutions (e.g. Security Manager [SM]| AutoEnrollment Server [AES]| Enrollment Server for Web [ESW]| and Entrust Entelligence Service Provider for Windows [ESPW])
3+ years of experience administrating Windows| Linux| IIS| Apache| and Tomcat

Preferred:

Current information security certification| including Certified Information Systems Security Professional (CISSP)| Certified Information Security Manager (CISM)| Certified SCADA Security Architect (CSSA) or Certified Secure Software Lifecycle Professional (CSSLP).
Good knowledge of current industry standard for security systems software and protocols
Good knowledge of networking principles and protocols
Experience with KeyFactor Command Tool
Proven knowledge of software evaluation principles and testing practices
Excellent understanding of change management and testing requirements| techniques| and tools
2+ years of experience designing and management of Entrust on-premise and cloud PKI solutions
2+ years of experience designing and management of Entrust cryptography analysis
4+ years of experience supporting system and application owners who use SSL certificates
2+ years of experience in researching emerging technologies and trends| standards| and products
2+ years of experience doing business analysis and requirements gathering for complex business systems
2+ years of experience with .Net and PowerShell scripting

CORE WORK ACTIVITIES

Manage the lifecycle of SSL certificates including issue| renewal and termination of SSL certificates for the enterprise
Manage the notification and escalation process for certificated due to expire
Interface with vendors that provide security / encryption related services
Participate in defining and developing the strategic plan for SSL for the enterprise
Lead the definition and implementation of POCs around SSL| KMS and other certificate related technologies
Ensure 24×7 uptime of the SSL services
Apply expert-level knowledge of SSL technologies to design and develop solutions to address customer problems
Participate in the continuous improvements of the PKI management processes and technology solutions
Apply a thorough understanding of the basics of IP networks and their workings (e.g. DNS| Security| IP Routing| HTTP| VPN)
Document requirements| designs| user manuals| security procedures| and operation reports
Lead stakeholders in creation of test cases for the verifying software| hardware and / or services on their security controls| integration| and performance characteristics
Assist in the integration of software products within the security environment in order to effectively support and improve the ongoing architecture of the enterprise’s security applications
Design security solutions to adequately address risks throughout the Marriott SDLC process and confirm that the level of risk is acceptable in accordance with Marriott’s policies
Coordination of system changes which effect various security environments
Validate / audit changes in the production security infrastructure
Attend change control board meetings and disseminate information to the application owners and technical teams
Assist with the identification and remediation of security events
Perform daily system monitoring| verify the integrity and availability of hardware| server resources| systems and key process

_

Security Engineer – Cloud Data Security – Marriott International HQ – USA

APPLY HERE

Job Number 20025066
Job Category Information Technology
Location Marriott International HQ| 10400 Fernwood Road| Bethesda|
Maryland| United States
Brand Corporate
Schedule Full-time
Relocation? No
Position Type Management

Start Your Journey With Us
Marriott International is the world’s largest hotel company| with more brands|
more hotels and more opportunities for associates to grow and succeed. We
believe a great career is a journey of discovery and exploration. So| we ask|
where will your journey take you?

JOB SUMMARY

The position is responsible for the design| deployment| and configuration of
the data security in Cloud IaaS| PaaS and SaaS environments. Enable the
organization to store| transmit and process sensitive data in these
environments| while implementing and monitoring compliance with data
governance policies| data security procedures| data privacy procedures.

CANDIDATE PROFILE

Education and Experience

Required:

Bachelor’s degree in Computer Sciences or related field or equivalent experience/certification
5+ years of information technology experience| with 3+ years of experience in information security
3+ years’ experience implementing| managing or governing security technologies| including encryption| access control| network security| intrusion detection
2+ years’ experience in in data security for multi-tenant Cloud IaaS| PaaS and SaaS environments.

Preferred:

Current information security certification| including Certified Information Security Manager (CISM)| or Certified Information Systems Security Professional (CISSP)
2+ years’ experience with Public Cloud environments
Familiarity with security frameworks CSA| NIST| CIS| PCI DSS| etc.
Demonstrated experiences identifying and assessing cloud security vulnerabilities and risks
Expertise in researching & evaluating identified vulnerabilities and risks to the organization|s information and systems
Technical leadership experience in a sourced environment.
Demonstrated previous responsibility for operational security for development| test| and production environments for Cloud IaaS| PaaS and SaaS environments.
Project management skills
Technical infrastructure operations| administration| or engineering background

CORE WORK ACTIVITIES

Data Security

Support the remediation of identified risks| endorse preventative solutions gather requirements| and influence stakeholders to reduce risk and maintain security alignment to corporate and or industry requirements.
Create and implement an operational security program to ensure the security of data in Cloud IaaS| PaaS and SaaS.
Partner with IT and Risk Management partners to develop and implement a comprehensive set of cyber-security policies and procedures governing Cloud IaaS| PaaS and SaaS environments.
Collaborate with Professional Services and Customer Support to create comprehensive guidelines and best practices for deployment of data security in Cloud environments.
Develop and maintain an effective cyber-security incident management process related to the data in Cloud environments.
Identify| select| deploy| and maintain appropriate monitoring and configuration management tools to provide proactive monitoring and management of the security posture of production environments.
Identify| select| deploy| and maintain authentication| authorization| and auditing solutions for production operations.
Stay current on cloud security policies| standards| regulations making recommendations for the company
Act as an advocate of information security policies| standards| controls and as an enabler to the business while managing risk appropriately
Track and report on the status of cloud data security risks to corporate/industry requirements.
Apply security-level knowledge of cloud environments| to continuously monitor solutions to understand and provide direct guidance for security remediation activities.
Partner with enterprise teams to establish preventative controls to support security needs via automation.
Play a key role in implementation & delivery of a formalized information security awareness offerings related to Public Cloud environments. Maintain strong awareness of cloud security incidents in the external community to identify threats and opportunities for enhancement. Apply those learnings to Cloud Security program and associated solutions

_

Security Engineer – PKI – Marriott International HQ – USA

APPLY HERE

Job Number 20023980
Job Category Information Technology
Location Marriott International HQ| 10400 Fernwood Road| Bethesda|
Maryland| United States
Brand Corporate
Schedule Full-time
Relocation? No
Position Type Management

Start Your Journey With Us
Marriott International is the world’s largest hotel company| with more brands|
more hotels and more opportunities for associates to grow and succeed. We
believe a great career is a journey of discovery and exploration. So| we ask|
where will your journey take you?

JOB SUMMARY

This position serves as a Public Key Infrastructure (PKI) subject matter
expert for the Global Information Security division. It focuses on the
administration| operation| upgrade and support of the on-premise & on-cloud
Entrust Certification Authorities (CA)| the on-cloud Entrust Public CA (ECS)|
and the on-cloud KeyFactor Command tool. The position’s other duties include
certificate provisioning| troubleshooting certificate installation and
configuration| documenting current and new PKI processes| and monitoring the
PKI ServiceNow request queue. The position works with other PKI experts to
fulfill PKI objectives| assignments| and projects. The position shares
rotational on-call duties. The candidate shall be experienced with creating
specifications (e.g. requirements) and testing software for accuracy and
reliability. The candidate must be customer service friendly| and performs
well both individually and in a team environment.

CANDIDATE PROFILE

Education and Experience

Required:

Bachelor’s degree in Computer Sciences or related field or equivalent experience / certification
3+ years of experience in the PKI management including SSL certificate lifecycle managements| expiration communications| and troubleshooting| as well as PKI management process improvements
3+ years of experience supporting and managing Entrust PKI solutions (e.g. Security Manager [SM]| AutoEnrollment Server [AES]| Enrollment Server for Web [ESW]| and Entrust Entelligence Service Provider for Windows [ESPW])
3+ years of experience administrating Windows| Linux| IIS| Apache| and Tomcat

Preferred:

Current information security certification| including Certified Information Systems Security Professional (CISSP)| Certified Information Security Manager (CISM)| Certified SCADA Security Architect (CSSA) or Certified Secure Software Lifecycle Professional (CSSLP).
Good knowledge of current industry standard for security systems software and protocols
Good knowledge of networking principles and protocols
Experience with KeyFactor Command Tool
Proven knowledge of software evaluation principles and testing practices
Excellent understanding of change management and testing requirements| techniques| and tools
2+ years of experience designing and management of Entrust on-premise and cloud PKI solutions
2+ years of experience designing and management of Entrust cryptography analysis
4+ years of experience supporting system and application owners who use SSL certificates
2+ years of experience in researching emerging technologies and trends| standards| and products
2+ years of experience doing business analysis and requirements gathering for complex business systems
2+ years of experience with .Net and PowerShell scripting

CORE WORK ACTIVITIES

Manage the lifecycle of SSL certificates including issue| renewal and termination of SSL certificates for the enterprise
Manage the notification and escalation process for certificated due to expire
Interface with vendors that provide security / encryption related services
Participate in defining and developing the strategic plan for SSL for the enterprise
Lead the definition and implementation of POCs around SSL| KMS and other certificate related technologies
Ensure 24×7 uptime of the SSL services
Apply expert-level knowledge of SSL technologies to design and develop solutions to address customer problems
Participate in the continuous improvements of the PKI management processes and technology solutions
Apply a thorough understanding of the basics of IP networks and their workings (e.g. DNS| Security| IP Routing| HTTP| VPN)
Document requirements| designs| user manuals| security procedures| and operation reports
Lead stakeholders in creation of test cases for the verifying software| hardware and / or services on their security controls| integration| and performance characteristics
Assist in the integration of software products within the security environment in order to effectively support and improve the ongoing architecture of the enterprise’s security applications
Design security solutions to adequately address risks throughout the Marriott SDLC process and confirm that the level of risk is acceptable in accordance with Marriott’s policies
Coordination of system changes which effect various security environments
Validate / audit changes in the production security infrastructure
Attend change control board meetings and disseminate information to the application owners and technical teams
Assist with the identification and remediation of security events
Perform daily system monitoring| verify the integrity and availability of hardware| server resources| systems and key process

_

Security Engineer – Cloud Data Security – Marriott International HQ – USA

APPLY HERE

Job Number 20025066
Job Category Information Technology
Location Marriott International HQ| 10400 Fernwood Road| Bethesda|
Maryland| United States
Brand Corporate
Schedule Full-time
Relocation? No
Position Type Management

Start Your Journey With Us
Marriott International is the world’s largest hotel company| with more brands|
more hotels and more opportunities for associates to grow and succeed. We
believe a great career is a journey of discovery and exploration. So| we ask|
where will your journey take you?

JOB SUMMARY

The position is responsible for the design| deployment| and configuration of
the data security in Cloud IaaS| PaaS and SaaS environments. Enable the
organization to store| transmit and process sensitive data in these
environments| while implementing and monitoring compliance with data
governance policies| data security procedures| data privacy procedures.

CANDIDATE PROFILE

Education and Experience

Required:

Bachelor’s degree in Computer Sciences or related field or equivalent experience/certification
5+ years of information technology experience| with 3+ years of experience in information security
3+ years’ experience implementing| managing or governing security technologies| including encryption| access control| network security| intrusion detection
2+ years’ experience in in data security for multi-tenant Cloud IaaS| PaaS and SaaS environments.

Preferred:

Current information security certification| including Certified Information Security Manager (CISM)| or Certified Information Systems Security Professional (CISSP)
2+ years’ experience with Public Cloud environments
Familiarity with security frameworks CSA| NIST| CIS| PCI DSS| etc.
Demonstrated experiences identifying and assessing cloud security vulnerabilities and risks
Expertise in researching & evaluating identified vulnerabilities and risks to the organization|s information and systems
Technical leadership experience in a sourced environment.
Demonstrated previous responsibility for operational security for development| test| and production environments for Cloud IaaS| PaaS and SaaS environments.
Project management skills
Technical infrastructure operations| administration| or engineering background

CORE WORK ACTIVITIES

Data Security

Support the remediation of identified risks| endorse preventative solutions gather requirements| and influence stakeholders to reduce risk and maintain security alignment to corporate and or industry requirements.
Create and implement an operational security program to ensure the security of data in Cloud IaaS| PaaS and SaaS.
Partner with IT and Risk Management partners to develop and implement a comprehensive set of cyber-security policies and procedures governing Cloud IaaS| PaaS and SaaS environments.
Collaborate with Professional Services and Customer Support to create comprehensive guidelines and best practices for deployment of data security in Cloud environments.
Develop and maintain an effective cyber-security incident management process related to the data in Cloud environments.
Identify| select| deploy| and maintain appropriate monitoring and configuration management tools to provide proactive monitoring and management of the security posture of production environments.
Identify| select| deploy| and maintain authentication| authorization| and auditing solutions for production operations.
Stay current on cloud security policies| standards| regulations making recommendations for the company
Act as an advocate of information security policies| standards| controls and as an enabler to the business while managing risk appropriately
Track and report on the status of cloud data security risks to corporate/industry requirements.
Apply security-level knowledge of cloud environments| to continuously monitor solutions to understand and provide direct guidance for security remediation activities.
Partner with enterprise teams to establish preventative controls to support security needs via automation.
Play a key role in implementation & delivery of a formalized information security awareness offerings related to Public Cloud environments. Maintain strong awareness of cloud security incidents in the external community to identify threats and opportunities for enhancement. Apply those learnings to Cloud Security program and associated solutions

_

Sr. Project Manager – Information Security PMO – Marriott International HQ – USA

APPLY HERE

Job Number 20032936
Job Category Information Technology
Location Marriott International HQ| 10400 Fernwood Road| Bethesda|
Maryland| United States
Brand Corporate
Schedule Full-time
Relocation? No
Position Type Management

Start Your Journey With Us
Marriott International is the world’s largest hotel company| with more brands|
more hotels and more opportunities for associates to grow and succeed. We
believe a great career is a journey of discovery and exploration. So| we ask|
where will your journey take you?

JOB SUMMARY

Delivers a project on time| within budget| while meeting Marriott’s
expectations. Plans| directs| and coordinates activities of department
security projects| individual work streams| or releases within a major systems
implementation program so that goals or objectives of projects are
accomplished within prescribed time frame and funding parameters. Shares
responsibility for planning| directing| and coordinating activities pertaining
to technology projects for a given business unit. Verifies that project goals
are accomplished and in line with business objectives. Monitors project
activities.

CANDIDATE PROFILE

Education and Experience

Required:.

7+ years’ experience in information technology project management across diverse application areas and technologies
Undergraduate degree| equivalent experience| or certification
PMP Certification

Preferred:

Graduate degree.
Project Management Certification
Demonstrated record of managing internal and external projects from inception to successful implementation
Solid understanding of current technologies with the ability to develop and deliver projects using leading edge technologies
Ability to align change management strategies with project
Skilled in conceptualizing creative solutions| documenting them| and presenting/selling them to senior management
Highly developed oral and written communication skills
Extremely high level of analytical ability to resolve complex and difficult issues
Very high level of interpersonal skills to work effectively with others| motivate employees| and elicit work output in a team environment

CORE WORK ACTIVITIES

Project Leadership

Directs the work of project team| including other project managers on a project-by-project basis.
Identifies and deploys resources required for projects.
Functions as escalation to project teams to resolve issues.
Collaborates within the Global Information Security team and across the enterprise to facilitate project completion

Managing Projects and Policies

Performs Information Technology (IT) project planning| including identifying and developing goals| strategy| staffing| scheduling| identifications of risks| contingency plans| allocation of available resources| and deliverables to meet business need.
Serves as liaison with business unit| Plan and Run teams.
Develops high-level business requirements including cost estimate for a project to determine whether the project is justified.
Identifies and schedules project deliverables| milestones| and required tasks.
Directs and coordinates activities of project personnel to monitor project(s) so that they progress on schedule and within budget.
Establishes standards and procedures for project reporting and documentation.
Reviews status reports prepared by project personnel and modifies schedules and plans as required.
Informs the appropriate team members of project status and related issues.
Interfaces with vendor(s) for programs under direct control.
Manages project risks.

Develops and tracks business case| including total process cost

_

Manager| Information Security – Risk Metrics and Reporting – Marriott International HQ – USA

APPLY HERE

Job Number 20023296
Job Category Information Technology
Location Marriott International HQ| 10400 Fernwood Road| Bethesda|
Maryland| United States
Brand Corporate
Schedule Full-time
Relocation? No
Position Type Management

Start Your Journey With Us
Marriott International is the world’s largest hotel company| with more brands|
more hotels and more opportunities for associates to grow and succeed. We
believe a great career is a journey of discovery and exploration. So| we ask|
where will your journey take you?

JOB SUMMARY

As a member of the Information Security Project Management Organization| the
Manager| Information Security Risk Metrics & Reporting works closely with
Cyber Security Incident Response| Compliance| Vulnerability Management| and
other IT teams to create and deliver Information Security Risk Reports|
including meaningful metrics| trends| key insights and detailed analyses
aligned to the NIST Cybersecurity Framework (CSF) functions: Identify|
Protect| Detect| Respond and Recover. The role synthesizes information into
dashboards and presentations for key stakeholders including Marriott’s Board
of Directors| business and continent/regional leaders| executive leadership
and other functional organizations. The role also maintains and continuously
improves the platform and tools that underpin the Information Security Risk
Reporting Program| including troubleshooting and fixing reporting issues| and
verifying the accuracy of key risk data.

CANDIDATE PROFILE

Education and Experience

Required:

Undergraduate degree in Statistics| Mathematics| Computer Science or related discipline
5 years of experience in developing| reporting and communicating analytic results
5 years of experience in implementing and using key reporting and business intelligence solutions (Tableau) and related data management

Preferred:

Experience with information security risk management| including Key Risk Indicators/Key Performance Indicators related to information security| cybersecurity or broader IT
Experience with regulatory frameworks and requirements as they apply to information security
Above-average proficiency in analytic methodologies| tools and dashboard development
Expert skills with key reporting and presentation tools (via Microsoft PowerPoint| Excel AND more advanced reporting solutions like Tableau)
Polished written and verbal communication skills| ability to work effectively and coordinate with data providers| disciplines and leadership across various functions
Strong detail orientation| self-driven and motivated with proven ability to interact with and communicate to stakeholders at all levels of the organization
Easily adapts to change quickly and can facilitate change to improve metric accuracy and reduce risk
Experience managing and automating metric programs
Advanced knowledge in Cybersecurity risk| frameworks| processes| tools and best practices
Working knowledge of information security industry frameworks (e.g. ISO| NIST| COBIT)

CORE WORK ACTIVITIES

Facilitate the creation and delivery of a monthly Executive Risk Report| including meaningful metrics reporting| trends| key insights and detailed analyses across the NIST Cybersecurity Framework (CSF) functions: Identify| Protect| Detect| Respond and Recover.
Establish automated data pipelines that feed data visualization tools; develop dashboards and visualization products using Tableau
Manage| standardize and normalize data collection from systems of record (data sources) to achieve repeatable outcomes for metrics reporting
Assist data source systems owners in developing data models used to achieve standardized| repeatable| and accurate risk reports
Perform quantitative and qualitative analysis on key risk indicators (KRIs) and trends| and provide recommendations related to inform decision making on activities performed by the Information Security organization
Monitor Key Risk Indicators (KRIs) and perform detailed analysis to understand root causes of changes in metrics
Monitor information security capability improvement and risk reduction of initiatives under implementation/ deployment
Create Executive Briefing presentations and visualizations; as well as| produce ad-hoc queries/reports to support communications and reporting to different stakeholder groups
Demonstrate metrics reporting platform and tools to stakeholders| communicate design requirements| and validate approach for enhancements/integration of new metrics
Develop and maintain a release schedule for activation and integration of new metrics
Conduct extensive quality control and record keeping procedures to ensure the highest level of data integrity
Manage the integration and communications across the Automated Metrics Reporting Platform| data source systems and other technology platforms| and ensure proper coordination with appropriate IT teams

_

Senior Security Engineer (Systems Certification and Accreditation) – Marriott International HQ – USA

APPLY HERE

Job Number 20032970
Job Category Information Technology
Location Marriott International HQ| 10400 Fernwood Road| Bethesda|
Maryland| United States
Brand Corporate
Schedule Full-time
Relocation? No
Position Type Management

Start Your Journey With Us
Marriott International is the world’s largest hotel company| with more brands|
more hotels and more opportunities for associates to grow and succeed. We
believe a great career is a journey of discovery and exploration. So| we ask|
where will your journey take you?

JOB SUMMARY

Advises and assists Information System Owners with vulnerability remediation
and secure implementation of full technology stack (e.g. application|
middleware| database| servers| etc.). Analyzes system security plans|
certification and accreditation (C&A) documentation to determine system
fitness for operation. Works closely with vulnerability management| risk
management| application security and security architecture to accredit and
authorize systems for operational release. Implements and reviews standards|
policies and procedures to enhance security certification and accreditation
processes. Performs certification activities on an as needed basis which may
include| code reviews| configuration audits| application security assessments|
vulnerability assessments and security control assurance validation. This
position requires a candidate with broad knowledge in network security|
application security and risk management. Candidate will lead setting the
strategy for the configuration| deployment and management of vulnerably
management solutions.

CANDIDATE PROFILE

Education and Experience

Required:

Undergraduate degree in Cyber Security| Computer Science or related field or equivalent experience/certification.
7+ years of experience in Information Security with at least 3 years of:
Performing risk assessments and analysis within Information Technology.
Performing quality assurance| basic software development and software project management.
2+ years’ experience in
Conducting qualitative risk management concepts
Use of at least one of the following general-purpose scripting language (i.e. Python| Perl| PHP| VB Script| PowerShell).
Application of general application security concepts (i.e. OWASP Top 10| MITRE CWE & CAPEC).
1+ years’ experience with:
Common web technologies (i.e. Docker| Kubernetes| Kafka| WAS| Tomcat| JBoss).
Web Application Security technology and principals (i.e. network segmentation| multi-tier architectures| microservice architecture| transport encryption| tunneling| SAML| OAuth/OIDC| web application firewalls).
All phases of Certification and Accreditation

Preferred:

Graduate degree in Cyber Security| Computer Science or related field.
Current information security certification| such as: Offensive Security Certified Professional (OSCP)| GIAC Penetration Tester (GPEN)| GIAC Enterprise Vulnerability Assessor (GEVA)| Certified Secure Software Lifecycle Professional (CSSLP).
Strong knowledge of vulnerability remediation methods beyond patching (secure configuration| attack surface area reduction| secure code implementation| zero trust networking concepts).
Demonstrated leadership experience in a sourced environment.
Demonstrated ability to work independently and with others.
Demonstrated ability to working in high velocity and complex environments.
Experience with setting the strategy for the configuration| deployment and management of vulnerably management solutions (i.e. Nessus Professional| Tenable Security Center and Tenable.io.)
Current cloud security certification| including AWS Certified Security – Specialty| GCP Professional Cloud Security Engineer
Proficient in quantitative risk management concepts.
Experience with performing SAST/DAST and Penetration Tests.
Experience with Fortify SCA/SSC.
5+ years of experience in infrastructure engineering (building| patching and managing RHEL systems at scale)
Proficient in at least one general-purpose system language (i.e. Java| C/C++| Golang| C#| Objective-C).

CORE WORK ACTIVITIES

Lead setting the strategy for the configuration| deployment and management of vulnerably management solutions (i.e. Nessus Professional| Tenable Security Center and Tenable.io.).
Perform comprehensive assessments of the management| operational| and technical security controls in an information system to determine the extent to which the controls are implemented correctly and producing the desired outcome| relative to the security requirements.
Initiate and/or evaluate vulnerability scans against application source code and infrastructure as needed to certify and accredit systems.
Manage third party security service provider resources or services that contribute to system certification assessments.
Analyze system architectures and designs to identify deficiencies in security control implementation| secure configuration and mitigation of security risk.
Provides authorization to operate| interim authorization to operate or denial of authorization to operate based on certification and accreditation state.
Review security accreditation packages (approved system security plans| security assessment report| plan of actions and milestones).
Respond to production risk analysis inquiries and provide guidance based on previously authorized releases and accreditation packages.
Leverage vulnerability scanning platforms (i.e. Fortify SCA| WebInspect| Netsparker| Zap| BurpSuite| Aqua CSP| Tenable.io) to perform detailed vulnerability assessments of applications and systems.
Provide patching guidance based on information provided by vulnerability assessment tools and vendor supplied remediation data.

Technical Leadership

Trains and/or mentors other team members| and peers as appropriate
Provides financial input on department or project budgets| capital expenditures or other cost/resource estimates as requested
Identifies opportunities to enhance existing processes

IT Governance

Follows all defined IT standards and processes (i.e. IT Governance| SM&G| Architecture| etc.)| and provides input for improvements to the appropriate process owners as needed
Maintains a proper balance between business and operational risk

Follows the defined project management standards and processes

_

Lifeguard (Certification and CPR/First Aid) – The Dearborn Inn – USA

APPLY HERE

Job Number 20033142
Job Category Golf| Fitness| and Entertainment
Location The Dearborn Inn| A Marriott Hotel| 20301 Oakwood Blvd.|
Dearborn| Michigan| United States
Brand Marriott Hotels Resorts /JW Marriott
Schedule Full-time
Position Type Non-Management/Hourly

Start Your Journey With Us
Marriott International portfolio of brands includes both JW Marriott and
Marriott Hotels.
Marriott Hotels | Marriott International’s flagship brand with more than
500 global locations| is advancing the art of hosting so that our guests can
travel brilliantly. As a host with Marriott Hotels| you will help keep this
promise by delivering premium choices| sophisticated style| and well-crafted
details. With your skills and imagination| together we will innovate and
reinvent the future of travel.

JW Marriott is part of Marriott International|s luxury portfolio and
consists of more than 80 beautiful properties in gateway cities and
distinctive resort locations around the world. JW believes our associates come
first. Because if you’re happy| our guests will be happy. It’s as simple as
that. Our hotels offer a work experience unlike any other| where you’ll be
part of a community and enjoy a true camaraderie with a diverse group of co-
workers. JW creates opportunities for training| development| recognition and
most importantly| a place where you can really pursue your passions in a
luxury environment. Treating guests exceptionally starts with the way we take
care of our associates. That’s The JW Treatment™.

Job Summary

Wash| mop| and clean the pool deck. Promote a fun and relaxing atmosphere for
guests in all recreational activities and areas by expressing an upbeat and
enthusiastic attitude. Observe activity in the recreational facility and
respond appropriately in accordance with local operating procedure in the
event of an emergency. Promote the rules and regulations of the recreation
facility. Be aware of possible situations where guests are not able to safely
participate in an activity and inform supervisor/manager. Provide assistance
to injured guests until the arrival of emergency medical services. Obtain|
fold| and stack towels according to company procedures. Report accidents|
injuries| and unsafe work conditions to manager; complete safety training and
certifications.

Follow all company and safety and security policies and procedures; report any
maintenance problems| safety hazards| accidents| or injuries; complete safety
training and certifications. Ensure uniform and personal appearance are clean
and professional. Maintain confidentiality of proprietary information; protect
company assets. Support all co-workers and treat them with dignity and
respect. Support team to reach common goals. Comply with quality assurance
expectations and standards. Move| lift| carry| push| pull| and place objects
weighing less than or equal to 25 pounds without assistance. Read and visually
verify information in a variety of formats (e. g.| small print). Visually
inspect tools| equipment| or machines (e. g.| to identify defects). Enter and
locate work-related information using computers and/or point of sale systems.
Grasp| turn| and manipulate objects of varying size and weight| requiring fine
motor skills and hand-eye coordination. Reach overhead and below the knees|
including bending| twisting| pulling| and stooping. Move over sloping| uneven|
or slippery surfaces and steps. Move up and down stairs and/or service ramps.
Perform other reasonable job duties as requested by Supervisors.

_

Senior Security Engineer – SOAR – Marriott International HQ – USA

APPLY HERE

Job Number 20031637
Job Category Information Technology
Location Marriott International HQ| 10400 Fernwood Road| Bethesda|
Maryland| United States
Brand Corporate
Schedule Full-time
Relocation? No
Position Type Management

Start Your Journey With Us
Marriott International is the world’s largest hotel company| with more brands|
more hotels and more opportunities for associates to grow and succeed. We
believe a great career is a journey of discovery and exploration. So| we ask|
where will your journey take you?

JOB SUMMARY

Serves as a Security Automation and Orchestration (A&O) engineer for
automation and content creation tasks to develop and integrate security A&O
solutions. Leverage knowledge of monitoring| analyzing| detecting| and
responding to Cyber events and incidents to develop and implement automated
processes for information systems and networks. Responsible for deploying and
configuring Phantom and Splunk products. Leads workgroups and/or functions as
a technical expert. Performs research| analysis| design| creation and
implementation of infrastructure systems to meet current and future security
requirements. Monitors multiple projects by Service Provider to successful
completion| maintaining scope within the time and budget constraints.

CANDIDATE PROFILE

Education and Experience

Required:

Bachelor’s degree in Computer Sciences or related field or equivalent experience/certification
5+ years of information technology experience
5+ years of experience in some or all of the following:
Incident Response or Security Operations Center (SOC) teams
Phantom and/or Splunk products
Scripting or programming language| including Python in a security operations capacity
API development and integration
Software Development Life Cycle (SDLC)

Preferred Skills/Experience:

Current information security certification| including Certified Information Security Manager (CISM)| Certified Information Systems Auditor (CISA) or Certified Information Systems Security Professional (CISSP)
Broad exposure to a wide range of IT security technologies| including Phantom Cyber
Technical leadership in a sourced environment
Project management
Technical infrastructure operations| administration| or engineering
Excellent communication skills and problem-solving ability
Demonstrated ability to work independently and with others
Demonstrated experience in Linux and networking
Writing and developing Python scripts
Troubleshooting skills and strong technical learning aptitude
Security Operations Centers| Incident Response| Architecture / systems engineering

CORE WORK ACTIVITIES

Provides support| oversight| governance and tactical direction related to A&O security services that are required to enable the delivery of IT services. Designs| develops| and implements dynamic Cyber defenses and leverages Cybersecurity solutions to deliver security A&O services| including automated threat hunting| contextual enrichment through threat intelligence| situational awareness of network and system intrusions| security event and alert prioritization| and incident response actions.
Provides input to the overall A&O security services architecture| governance model.
Provide technical oversight| standardization and validation of the effectiveness of A&O security systems.
Participates in efforts on researching| designing| and implementing security are components that are standards based| high performing| highly available and secure in delivering the required business functionality.
Educates internal and external users of security technologies to continually improve the knowledge and skill-base of the organization on how best to operate and support the technology and security services.
Collaborates to develop and integrate custom A&O playbooks| use cases| and workflow integrations across A&O and Cybersecurity Open Source and COTS products and platforms.
Develops highly extensible| scalable| and secure Cloud-based A&O services that can be adopted and integrated in a wide range of Cybersecurity use cases.
Contributes to a culture of excellence in technical security threat management and incident response.
Participates in the evaluation and selection of security service products.
Supports governance based on best practices and facilitates proper alignment to projects and major initiatives
Supports analysis of the current environment to detect critical deficiencies and recommends solutions for improvement.
Supports analysis of technology industry and market trends to determine their potential impact on security services architecture.
Supports Solution and Domain Architecture by providing current environment status in terms of technology| software and infrastructure for projects in the delivery life cycle
Utilizes capability modeling to align systems strategy and planning with business strategy and goals.
Consults with project teams to identify when it is necessary to modify infrastructure and security services to accommodate project needs.
Consults with architecture teams to identify when it is necessary to modify the technical architecture to accommodate infrastructure and security needs.
Participates in the documentation of all architecture design and analysis work.
Supports| implements and promotes standard configuration and change management| processes and practices.

Delivering Technology

Performs quantitative and qualitative analyses for service delivery processes and projects.
Supports existing systems and projects in a minimum of one environment.
Reviews completeness of requirements prior to Service Provider solutioning
Participates with the Service Provider in planning and coordinating implementation| reviewing quality control of systems functional design| usability| functionality| and implementation.
Provides input to support desk change management efforts as it relates to support and training of new system
Coordinates with appropriate IT and vendor relations teams
Provides consultation for routine systems development
Ensures early warning to the leadership regarding degraded or missed service levels

MANAGEMENT COMPETENCIES

Leadership

Communication – Conveys information and ideas to others in a convincing and engaging manner through a variety of methods.
Leading Through Vision and Values – Keeps the organization|s vision and values at the forefront of employee decision making and action.
Managing Change – Initiates and/or manages the change process and energizes it on an ongoing basis| taking steps to remove barriers or accelerate its pace; serves as role model for how to handle change by maintaining composure and performance level under pressure or when experiencing challenges.
Problem Solving and Decision Making – Identifies and understands issues| problems| and opportunities; obtains and compares information from various sources to draw conclusions| develops and evaluates alternatives and solutions| solves problems| and chooses a course of action.
Professional Demeanor – Exhibits behavioral styles that convey confidence and command respect from others; makes a good first impression and represents the company in alignment with its values.
Strategy Development – Develops business plans by exploring and systematically evaluating opportunities with the greatest potential for producing positive results; ensures successful preparation and execution of business plans through effective planning| organizing| and on-going evaluation processes.

Managing Execution

Building a Successful Team – Uses an effective interpersonal style to build a cohesive team; inspires and sustains team cohesion and engagement by focusing the team on its mission and importance to the organization.
Strategy Execution – Ensures successful execution across of business plans designed to maximize customer satisfaction| profitability| and market share through effective planning| organizing| and on-going evaluation processes.
Driving for Results – Sets high standards of performance for self and/or others; assumes responsibility for work objectives; initiates| focuses| and monitors the efforts of self and/or others toward the accomplishment goals; proactively takes action and goes beyond what is required.

Building Relationships

Customer Relationships – Develops and sustains relationships based on an understanding of customer/stakeholder needs and actions consistent with the company’s service standards.
Global Mindset – Supports employees and business partners with diverse styles| abilities| motivations| and/or cultural perspectives; utilizes differences to drive innovation| engagement and enhance business results; and ensures employees are given the opportunity to contribute to their full potential.
Strategic Partnerships – Develops collaborative relationships with fellow employees and business partners by making them feel valued| appreciated| and included; explores partnership opportunities with other people in and outside the organization; influences and leverages corporate and continental shared services and/or discipline leaders (e.g.| HR| Sales & Marketing| Finance| Revenue Management) to achieve objectives; maintains effective external relations with government| business and industry in respective countries; performs effectively as a liaison between locations| disciplines| and corporate to ensure needed resources are received and corporate strategies are understood and executed.

Generating Talent and Organizational Capability

Developing Others – Supports the development of other’s skills and capabilities so that they can fulfill current or future job/role responsibilities more effectively.
Organizational Capability – Evaluates and adapts the structure of assignments and work processes to best fit the needs and/or support the goals of an organizational unit.

Learning and Applying Professional Expertise

Continuous Learning – Actively identifies new areas for learning; regularly creates and takes advantage of learning opportunities; uses newly gained knowledge and skill on the job and learns through their application.
Technical Acumen – Understanding and utilizing professional skills and knowledge in a specific functional area to conduct and manage everyday business operations and generate innovative solutions to approach function-specific work challenges
Technical Intelligence: Knowledge and ability to define and apply appropriate technology to enhance business process
Development Methodologies: Knowledge of general stages of SDLC framework and the application tiers within the development space.
Information Security: Knowledge of the security considerations relevant within the development space| including industry best practices related to information security

Business Acumen – Understands and utilizes business information to manage everyday operations and generate innovative solutions to approach business and administrative challenges.
Basic Competencies – Fundamental competencies required for accomplishing basic work activities.

Basic Computer Skills – Using basic computer hardware and software (e.g.| personal computers| word processing software| Internet browsers| etc.).
Mathematical Reasoning – The ability to add| subtract| multiply| or divide quickly| correctly| and in a way that allows one to solve work-related issues.
Oral Comprehension – The ability to listen to and understand information and ideas presented through spoken words and sentences.
Reading Comprehension – Understanding written sentences and paragraphs in work related documents.
Writing – Communicating effectively in writing as appropriate for the needs of the audience.

_

Senior Security Engineer – SIEM Content – Marriott International HQ – USA

APPLY HERE

Job Number 20030221
Job Category Information Technology
Location Marriott International HQ| 10400 Fernwood Road| Bethesda|
Maryland| United States
Brand Corporate
Schedule Full-time
Relocation? No
Position Type Management

Start Your Journey With Us
Marriott International is the world’s largest hotel company| with more brands|
more hotels and more opportunities for associates to grow and succeed. We
believe a great career is a journey of discovery and exploration. So| we ask|
where will your journey take you?

JOB SUMMARY

Serves as Splunk engineer responsible for developing SIEM content to monitor
and detect of potential security incidents across the Marriott enterprise.
Responsible for SIEM content management| content creation| rule tuning|
reporting| alert creation. Produces high-quality process documentation for
monitoring and content creation tasks. Leverages knowledge of monitoring|
analyzing| detecting| and responding to Cyber events and incidents to develop
and implement monitoring and alerting for information systems and networks.

CANDIDATE PROFILE

Education and Experience

Required:

Bachelor’s degree in Computer Sciences or related field or equivalent experience/certification
7+ years of information technology experience
5+ years of experience in some or all of the following:
Incident Response or Security Operations Center (SOC) teams
Splunk products
Scripting or programming language| including Python
API development and integration
Other logging platforms (ArcSight| SumoLogic| QRadar| etc.)

Preferred Skills/Experience:

Current information security certification| including Certified Information Security Manager (CISM)| Certified Information Systems Auditor (CISA) or Certified Information Systems Security Professional (CISSP)
Experience with architecting| implementing| and operating Splunk or other big data platforms
Experience with IDS| IPS| and SIEM appliance architecture| operations| and management
Experience working in a globally distributed enterprise environment
Experience with monitoring use case implementation methodologies
Knowledge of Linux| Unix and Microsoft operating systems
Knowledge of TCP/IP protocols
Experience using regex (regular expressions) with a scripting language (nix shells| python| c++| ruby| etc.) is acceptable
Excellent communication skills and problem-solving ability
Troubleshooting skills and strong technical learning aptitude

CORE WORK ACTIVITIES

Creating and performing review and validation of daily compliance reports to track business as usual and out of policy activities.
Working with the Cybersecurity Incident Response Team and Threat Intelligence Team to identify content improvements.
Assisting the Cybersecurity Incident Response Team and Threat Intelligence Team with searches by acting as an expert in Splunk Search Language.
Provides input to the overall SIEM security services architecture| governance model.
Provide technical oversight| standardization and validation of the effectiveness of SIEM content service.
Participates in efforts to research| design and implement components in the SIEM content development space that are standards-based| high-performing| highly available and secure.
Educates internal and external users of security technologies to continually improve the knowledge and skill-base of the organization on how best to operate and support the technology and security services.
Develops highly-extensible| scalable| and SIEM content services that can be adopted and integrated in a wide range of Cybersecurity use cases.
Contributes to a culture of excellence in technical security threat management and incident response.
Participates in the evaluation and selection of security service products.
Supports governance based on best practices and facilitates proper alignment to projects and major initiatives
Supports analysis of the current environment to detect critical deficiencies and recommends solutions for improvement.
Supports analysis of technology industry and market trends to determine their potential impact on security services architecture.
Utilizes capability modeling to align systems strategy and planning with business strategy and goals.
Consults with project teams to identify when it is necessary to modify infrastructure and security services to accommodate project needs.
Consults with architecture teams to identify when it is necessary to modify the technical architecture to accommodate infrastructure and security needs.
Participates in the documentation of developed content| architecture and analysis work.
Supports| implements and promotes standard configuration and change management| processes and practices.

Delivering Technology

Performs quantitative and qualitative analyses for service delivery processes and projects.
Supports existing systems and projects in a minimum of one environment.
Reviews completeness of requirements prior to Service Provider or internal solutioning
Participates with the Service Provider or internal team in planning and coordinating implementation| reviewing quality control of systems functional design| usability| functionality| and implementation.
Provides input to support desk change management efforts as it relates to support and training of new system
Coordinates with appropriate IT and vendor relations teams
Provides consultation for routine systems development
Ensures early warning to the leadership regarding degraded or missed service level issues

_