Your Impact
The primary purpose of this role is to support the design, implementation, and ongoing operations of information security tools and services. This includes translating business and technical requirements into robust enterprise security software solutions that ensure information assets are adequately protected with acceptable levels of control. This also includes monitoring, testing, and evaluating security assessments of systems and taking steps to help design and implement remediation solutions.
To be successful, the individual in this role must know security practices and tools related to identity and access management along with enterprise digital certificate management systems. This role helps establish and maintain programs that enable the business to operate efficiently and remain in compliance with regulatory and industry best practices.
Key Responsibilities
- The primary purpose of this role is to support the design, implementation, and ongoing operations of information security tools and services in the Identity and Access Management (IAM) space, specifically around authentication and authorization
- Responsible for enterprise-level support, standards, and best practices for identity access management (IAM) and IAM-related services related to access management (Identity Providers, Enterprise Directories, etc.)
- Able to understand, translate, and implement auth services in accordance with standards (i.e. OAuth, OIDC, SAML 2.0, etc.)
- Supports the implementation and maintenance of assigned information security solutions to ensure successful deployment and operation; develops and documents detailed standards (e.g., guidelines, processes, procedures)
- Assists the Information Security team in monitoring security systems, reviewing logs, and managing information security systems
- Collaborates with other technology teams including Engineering to design and implement solutions
- Remains aware of technological trends and developments in the area of information security
- Participates in continuing education and learning, not only about the software and solutions assigned but also about security and risk management standards and best practices
- Solves difficult technical problems; solutions are testable, maintainable, and efficient
- Provides support in the event of escalated security issues for enterprise systems; helps diagnose, troubleshoot, and resolve issues
- Supports the implementation of hardware and software changes into environments to ensure security requirements are met
- Provides input into security breach response procedures; assists with security breach response activities
- Participates in break/fix activities
- Analyzes the output of industry-standard cybersecurity tools and helps identify remediations to reduce risk and exposure of applications
- Completes basic custom enhancements of applications using secure coding techniques to reduce the threat of remote or local vulnerabilities
- Evaluate entire applications (Container, Infrastructure, host platform) to identify potential threats and vulnerabilities
- Monitors and analyzes the current state of platforms to ensure performance is within pre-determined thresholds.
- Collaborates with vendors and other teams in matters of products, troubleshooting, maintenance, and documentation.
- Possess working knowledge of JSON, REST, and API integrations and security
What You will Do;
- Bachelor's Degree in Computer Science, CIS, Engineering, Cybersecurity, or a related field (or equivalent work experience in a related field)
- 2 Years of experience in technology system support, software development, or a related field
- 1 Year of experience with information security applications and systems
Preferred Qualifications
- Masters Degree in Computer Science, CIS, Business Administration, or related field
- Experience installing, configuring, and maintaining an authentication tool (i.e; ping identity, ForgeRock, Keycloak).
- Experience with deploying CI/CD pipelines.
- 1 Year of experience working on project(s) involving the implementation of solutions applying development life cycles (SDLC)
- 2 years of experience analyzing the output of industry-standard cybersecurity tools and identifying remediations to reduce risk and exposure of applications
- Relevant information security certifications (e.g., CISSP, CISM, CEH, PCI ISA, CRISC, CISA, OSCP, GPen).
- Advanced understanding of information security practices and policies
- 2 Years of IT experience developing and implementing business systems within an organization
- 2 years of experience working with defect or incident-tracking software
- 2 Years of experience with technical documentation in a software development environment
- 2 years of experience working with an IT Infrastructure Library (ITIL) framework
- 2 years of experience leading teams, with or without direct reports
- Experience with Cloud technologies
Where You'll Be
- Associates are required to relocate to the Charlotte region to foster collaboration and facilitate improved testing and support.
- Lowe's supports a Flex Office concept where in-person work is required two days per week at the Charlotte Tech Hub
- Most business meetings are planned around the Eastern time zone.
About Lowe's
Lowe's Companies, Inc. (NYSE: LOW) is a FORTUNE® 50 home improvement company serving approximately 16 million customer transactions a week in the United States. With total fiscal year 2023 sales of more than $86 billion, Lowe's operates over 1,700 home improvement stores and employs approximately 300,000 associates. Based in Mooresville, N.C., Lowe's supports the communities it serves through programs focused on creating safe, affordable housing and helping to develop the next generation of skilled trade experts. For more information, visit Lowes.com .
Lowe's is an equal opportunity employer and administers all personnel practices without regard to race, color, religious creed, sex, gender, age, ancestry, national origin, mental or physical disability or medical condition, sexual orientation, gender identity or expression, marital status, military or veteran status, genetic information, or any other category protected under federal, state, or local law.
Top Skills
What We Do
It’s curious to think of innovation and stability co-existing. But we pair a 100-year track record of success with a hunger to do things differently. Everyone is in the work — tackling complex problems where your impact can build back or build up the communities we serve.
We fill our halls with curious minds from all walks of life. Our differences make us stronger, which is why our leaders build cultures of recognition and inclusion. You are heard, and your curiosities are celebrated and championed here.
Why Work With Us
We have built a space where the curious can move freely. Up in title, up in skills, to the side with teams, or back to try something completely new. We help you find your path — because when you win, we all win.
Gallery
Lowe’s Offices
Hybrid Workspace
Employees engage in a combination of remote and on-site work.