JOIN OUR TEAM AND EXPERIENCE ENDLESS CAREER POSSIBILITIES
[Position] Á¤º¸º¸È£ ½Ã½ºÅÛ ¼³°è¡¤±¸Ãà Àü¹®°¡ | IT Cyber Security Architect (8³â ÀÌ»ó)
[Mohegan INSPIRE Entertainment Resort]
¸ðÈ÷°Ç ÀνºÆÄÀÌ¾î ¿£ÅÍÅ×ÀθÕÆ® ¸®Á¶Æ®´Â ¾Æ½Ã¾ÆÀÇ Â÷¼¼´ë ¿£ÅÍÅ×ÀθÕÆ® ¸®Á¶Æ®ÀÌÀÚ ±Û·Î¹ú °ü±¤ ¸í¼Ò·Î½á ´Ù¾çÇÑ ÃÖ°í±Þ ½Ã¼³°ú Áñ±æ °Å¸®¸¦ ÇÑ ÀÚ¸®¿¡¼ ¸¸³¯ ¼ö ÀÖ´Â °÷ÀÔ´Ï´Ù. ¿©±â¿¡´Â 1,200½Ç ±Ô¸ðÀÇ ·°¼Å¸® È£ÅÚ 3°³µ¿, ¿Ü±¹ÀÎ Àü¿ë Ä«Áö³ë Áß ±¹³» ÃÖ´ë±Ô¸ðÀÇ °ÔÀÌ¹Ö ½Ã¼³, ´Ù¾çÇÑ K-pop ¹× ±Û·Î¹ú ¾ÆƼ½ºÆ®ÀÇ °ø¿¬ÀÌ °¡´ÉÇÑ 15,000¼® ±Ô¸ðÀÇ ±¹³» ÃÖÃÊ ´Ù¸ñÀû ¾Æ·¹³ª, ¿©·¯ ¹æÇâÀ¸·Î »¸¾î ³ª°¡´Â °¡º¯Çü °ø°£À¸·Î ±¸¼ºµÈ ÄÁº¥¼Ç ¼¾ÅÍ, »ç°èÀý ÀÌ¿ë°¡´ÉÇÑ ´ë±Ô¸ð µ¼Çü ½Ç³» ¿öÅÍÆÄÅ© ±×¸®°í ¾ß¿Ü Å׸¶ °ø°£, ±×¸®°í ±¹³»¿Ü À¯¼öÀÇ ¼îÇκ귣µå¿Í, °í±Þ ´ÙÀ̴׺ÎÅÍ ½ºÆ®¸´ Ǫµå±îÁö ´Ù¾çÇÏ°Ô Áñ±æ ¼ö ÀÖ´Â ±Û·Î¹ú ¹Ì½Ä °ø°£, µ¶º¸ÀûÀÎ ÃÖ÷´Ü ¿£ÅÍÅ×ÀθÕÆ® ¿ä¼Ò°¡ °áÇÕµÈ ¸®Å×ÀÏ ½Ã¼³ÀÌ Æ÷ÇԵ˴ϴÙ. Ư»ö ÀÖ´Â ½Ã¼³ ¹× ´Ùä·Î¿î ¿£ÅÍÅ×ÀθÕÆ® ¿É¼ÇÀ» °®Ãá ÀνºÆÄÀ̾î´Â Àü ¼¼´ë¸¦ ¾Æ¿ï·¯ ¸ðµç ¹æ¹®°´¿¡°Ô ÀØÁö ¸øÇÒ °æÇèÀ» ¼±»çÇÒ °ÍÀÔ´Ï´Ù.
[Spirit of Aquai]
¸ðÈ÷°ÇÀ» ´ëÇ¥ÇÏ´Â ¹®È ¡®Spirit of Aquai¡¯´Â ¸ðµç ¸ðÈ÷°Ç ±â¾÷ÀÇ ¸â¹ö¸¦ Çϳª·Î ¿¬°áÇÏ´Â Çൿ°ú °¡Ä¡ÀÔ´Ï´Ù.
Welcoming
Áø½ÉÀ» ´ÙÇÏ¿© ÆÀ¿ø°ú °Ô½ºÆ® ±×¸®°í ÆÄÆ®³Ê¸¦ ÀνºÆÄÀÌ¾î °¡Á·À¸·Î ȯ¿µÇÕ´Ï´Ù.
Building Relationship
ÆÀ¿ø°ú °Ô½ºÆ® ±×¸®°í ÆÄÆ®³Ê¿¡°Ô Ưº°ÇÑ °æÇèÀ» Á¦°øÇÏ¿© Àå±âÀûÀÎ ½Å·Ú°ü°è¸¦ ±¸ÃàÇÕ´Ï´Ù.
Mutual Respect
ÆÀ¿ø°ú °Ô½ºÆ® ±×¸®°í ÆÄÆ®³Ê¸¦ »óÈ£ Á¸ÁßÇÕ´Ï´Ù.
Cooperation
ÆÀ¿ø°ú °Ô½ºÆ® ±×¸®°í ÆÄÆ®³Ê¿Í ÇÔ²² Çù·ÂÇÏ¿© °øµ¿ÀÇ ¸ñÇ¥¸¦ ´Þ¼ºÇÕ´Ï´Ù.
ÀνºÆÄÀ̾î´Â ¸ðÈ÷°Ç °¡Á·À¸·Î¼ ¾ÆÄùÀÌ Á¤½Å¿¡ µû¶ó Áñ°Ì°Ô ÀÏÇÏ¸ç ¿ª·®À» ÆîÃÄ ³ª°¥ ÆÀ ¸â¹öµéÀ» Áø½ÉÀ¸·Î ȯ¿µÇÕ´Ï´Ù.
-Be INSPIRED-
Inspire Entertainment Resort °ø½Ä ȨÆäÀÌÁö: https://www.inspirekorea.com/
Inspire Entertainment Resort LinkedIn Page: https://www.linkedin.com/company/inspireer
Mohegan °ø½Ä ȨÆäÀÌÁö: https://mohegangaming.com/
[HR Talk]
INPSIRE Entertainment ResortÀÇ IT ºÎ¼¿¡¼ Cyber Security Architect ¸¦ ä¿ëÇÕ´Ï´Ù. Inspire Á¤º¸¿Í Á÷¿ø, °í°´ Á¤º¸ÀÇ ±â¹Ð¼º ¹«°á¼º, °¡¿ë¼ºÀ» À¯ÁöÇϱâ À§ÇÑ Á¤º¸º¸¾È ¾ÖÇø®ÄÉÀÌ¼Ç ¹× Á¤º¸º¸¾È ³×Æ®¿öÅ© ½Ã½ºÅÛÀ» ¼³°è, °ü¸®, Áö¿øÇÏ´Â ÀÏÀ» ´ã´çÇÏ´Â position ÀÔ´Ï´Ù.
Cyber Security ÇÁ·ÎÁ§Æ®¸¦ Áö¿øÇÏ°í, ±â¼úÀ» ¿¬±¸Çϸç, ÀÏ»çÀûÀÎ À§Çù½Äº°, Ãë¾à¼º, À§ÇèºÐ¼® ¹× ÇØ°áÀ» À§ÇÑ ¸®´õ ¿ªÇÒÀ» ÇÕ´Ï´Ù.
ÃÖ¼Ò 8³â ÀÌ»ó °æ·ÂÀÌ ÀÖ¾î¾ß Çϸç, º»»çÀÎ Mohegan Corporate Cybersecurity ÆÀ°ú ±ä¹ÐÈ÷ Çù·ÂÇϱ⠶§¹®¿¡ Fluent ÇÏÁö ¾Ê´õ¶óµµ ¿µ¾î·Î ÀÚ½ÅÀÇ ÀÇ°ßÀ» ¸íÈ®ÇÏ°í ÀڽŠÀÖ°Ô ¼ÒÅëÇÏ½Ç ¼ö ÀÖ´Â ºÐÀ» ¼±È£ÇÕ´Ï´Ù.
ÀÚ¼¼ÇÑ »çÇ×Àº ¾Æ·¡ÀÇ Job DescriptionÀ» Âü°íÇØ Áֽñ⠹ٶø´Ï´Ù.
[Position] Á¤º¸º¸È£ ½Ã½ºÅÛ ¼³°è¡¤±¸Ãà Àü¹®°¡ | IT Cyber Security Architect (8³â ÀÌ»ó)
Position Summary:
The Cybersecurity Architect is responsible for architecting, designing, administering, and supporting information security applications and information security network systems in a large, distributed enterprise to maintain the confidentiality, integrity, and availability of Inspirer¡¯s information and that of its employees and guests. In addition, this position assists in high impact projects, researches and recommends technology as directed. Serves as a lead for day-to-day threat identification, vulnerability and risk analysis and remediation. Researches, evaluates, and recommends different innovative security technologies to implement business goals. Works closely with the Mohegan Corporate Cybersecurity team to ensure Inspire Cybersecurity is aligned with corporate policies, tools, vendors, and practices.
Primary Duties and Responsibilities:
- Responsible for network security technical architecture and makes recommendations related to information security throughout the Inspire Property.
- Manages security systems at all levels of the business ranging from network devices to servers.
- Provide detailed risk and remediation guidelines, as well as perform remediation activities where applicable.
- Responsible for securing enterprise information by determining application security requirements; planning, implementing, and testing security controls; preparing security standards, policies, and procedures.
- Conduct security architecture reviews on existing technology and offer plans for remediation.
- Monitors LAN/WAN infrastructure activity and performance for identifying potential security, speed, and performance concerns. Recommends courses of action for remediation as needed.
- Key stakeholder in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures, and use of firewalls and encryption routines)
- Perform network assessments, capacity planning, and architecture reviews. Conduct routine hardware and software audits to ensure compliance with established standards, policies, and configuration guidelines.
- Develop and maintain appropriate configuration, design, and SOP documentation.
- Collaborates with other information technology centers of excellence to contribute expertise in solving problems with production, system performance and tuning.
- Contributes advanced knowledge and experience in the area of cybersecurity and related hardware/software.
- Maintains a high level of technical expertise and knowledge of current products, to determine which best meet the organization¡¯s needs.
- Responsible for networking security concerns including managing outsourced MSSP, SIEM, IDS/IPS, and anti-malware tools.
- Enforces security policies and procedures by administering and monitoring security profiles, reviewing network security issues, investigating possible security exceptions, updates, and maintains and documents security controls.
- Delivers reports to superiors regarding the effectiveness of data security and makes recommendations for the adoption of new procedures.
- Administrates and provides primary application support and ongoing feedback for cybersecurity technical platforms.
- Executes computer investigation efforts as self-identified or requested and authorized by management.
- Participates on the Change Control Review Board to provide information security subject matter expertise.
- Presents information to management that may result in the purchase and installation of hardware, software, and equipment.
- Acts as an internal consultant and mentor, providing technical guidance to junior staff.
- Works with management, peers, and vendors to design and implement hardware/software configurations, logical models, operational management models, and business continuity plans for systems under management.
- Collaborates with information technology management, peers, and vendors to provide ongoing monitoring, performance tuning, implementation, and fault root cause analysis for systems under management.
- Creates and maintains of troubleshooting and operational documentation for all systems under management. Authors and peer-reviews knowledgebase articles documenting fault root causes and their respective resolutions.
- Provides and receives cross-discipline training to ensure maximum availability of systems under management.
- Actively pursues opportunities to improve knowledge, tools, and processes for systems under management.
- Provides enterprise-wide support as needed.
- Responsible for maintaining and enforcing confidentiality and privacy rules according to all applicable regulations.
- Participates in and complies with MGE¡¯s Change Management process and methodology.
- Responsible for enforcing regulatory requirements.
- Provides on-call 24/7/365 production support for designated systems.
Minimum Education and Qualifications:
- Bachelor¡¯s degree in computer science, Cyber Security, Information Technology or related field, and 5-7 years of progressive Information Technology experience
- 8+ years¡¯ experience in infrastructure architecture and security management providing support to an enterprise information security infrastructure for a corporation of at least 2,000 employees.
- Associate degree in computer science, Cyber Security, Information Technology or related field, and eight years of progressive Information Technology experience
- Five years of experience as an Information Security Specialist providing support to an enterprise information security infrastructure for a corporation of at least 2,000 employees
- ~
- Demonstrated technical knowledge of local and wide area networking, operating systems, security best practices, and architectures.
- Competent in advanced communication skills including the ability to translate technical security concepts to business-oriented audiences.
- Experience in interfacing with multiple information technology application and infrastructure development and support areas within an enterprise
- Demonstrated ability to develop metrics, perform critical analysis, and develop executive decision-support content.
- Experience designing and deploying network and security services for large organizations.
- Experience in creating, reading, analyzing, and interpreting documents and technical procedures.
- Experience in the secure configuration/implementation of firewalls, intrusion detection/prevention systems, internet proxies, security information management products, and host-based configurations.
- Knowledge of the CIS Security Controls.
- Knowledge of NIST 800-53 security controls.
- Excel at process improvement and root cause analysis.
- Excellent written and oral skills.
- CISSP, GIAC, CEH, or related information security certifications are preferred.
Preferred Technology Experience:
- Experience in one or more of the following infrastructure devices: Palo Alto, Cisco ASA, F5, FortiGate.
- Experience in configuring/administrating a broad spectrum of infrastructure security technologies, including SIEM, DLP, IAM, NAC, EDR, CASB, file system auditing tools, vulnerability management solutions.
- Versed in Azure, Delinea (Thycotic), Fortinet, Nessus/Tenable, Palo Alto Networks, SailPoint, Forcepoint, Varonis, or comparable types of security solutions.
- Experience in one or more of the following operating system environments: Microsoft Windows Server 2008/10/12 or Redhat Linux ES 4/5/6
- Hands-on experience with one or more of the following: LDAP, ADAM, SSO, SAML, Active Directory
- Experience with network architecture and topologies
- Experience with Internet Information Server (IIS)
- Experience with firewalls, iptables, whitelisting, and security groups
- Experience with Cloud and hybrid Cloud/On-prem security models
- Experience with Azure and AWS infrastructure
Competencies: Incumbent will master the following competencies while in this position:
- Expert knowledge of all currently deployed Inspire Cyber Security products or similar.
- Solid knowledge of and experience VPN, GRE, Client VPN technologies
- Solid knowledge of and experience Firewalls, Access-list and IPSs
- Understanding of VRF, VLAN, port-channel, and sub-interface technologies.
- Expert knowledge of and experience with Network and Security infrastructure such as Firewalls, Network Load balancing, and Proxy devices.
- Troubleshoot network communication problems as they relate to firewalls.
- Correlate detected network events to identify potential problems or root causes.
Physical Demands and Work Environment:
- Office & Operational Work Environment.
- Be able to sit in front of a computer screen for extended periods of time.
- Be able to work in a fast-paced work environment with frequent interruptions.
- Based on Operational requirements, be able to work flexible hours including days, evenings, weekends, and holiday periods.
- Requires a valid driver¡¯s license and passport.
- Must be willing to work flexible to support resort operations.
- Must be willing to travel locally and regionally to conduct business, and occasional travel within Korea. (ÇØ¿Ü ¿©ÇàÀÇ °á°Ý »çÀ¯°¡ ¾ø´Â ÀÚ)
•This is not necessarily an exhaustive list of all responsibilities, requirements or working conditions associated with this job. INSPIRE Integrated Resort reserves the right to make changes to the above job description whenever necessary.
[»ó¼¼Á÷¹«±â¼ú¼ ¹× Áö¿ø¹æ¹ý]
±¹¿µ¹® ÅëÇÕ À̷¼(word ¶Ç´Â PDF )¸¦ ÀÚü ä¿ëÆ÷ÅÐ(Workday·Î ¿¬°áµË´Ï´Ù.)À» ÅëÇØ Á÷Á¢ Áö¿ø
* ´ç»ç´Â ÀÚü ä¿ëÆ÷ÅÐÀ» Á¦¿ÜÇÑ »ç¼³ À̸ÞÀÏÀ̳ª SNSµîÀ¸·Î ÀÏüÀÇ °³ÀÎÁ¤º¸¸¦ ¼öÁýÇϰųª ¿ä±¸ÇÏÁö ¾ÊÀ½À¸·Î °¢º°È÷ ÁÖÀÇÇØÁֽñ⠹ٶø´Ï´Ù.
[Áö¿ø½ÃÀ¯ÀÇ»çÇ×]
¡®Ã¤¿ë ÀýÂ÷ÀÇ °øÁ¤ÈÀÇ °üÇÑ ¹ý·ü(ÀÌÇÏ Ã¤¿ëÀýÂ÷¹ý)¡¯¿¡ ÀÇ°ÅÇÏ¿©,
ÀÚ°ÝÁõ, ÇÐÀ§ µî ÁõºùÀÚ·á´Â ÃßÈÄ ¿äû ½Ã Á¦ÃâÇÏ°Ô µË´Ï´Ù.
À̷¼¿¡ Áֹεî·Ï¹øÈ£, °¡Á·»çÇ× µîÀÇ °³ÀÎÁ¤º¸¸¦ ±âÀçÇÏÁö ¸¶½Ã±â ¹Ù¶ø´Ï´Ù.
Àå¾ÖÀÎ ¹× º¸ÈÆ ÇØ´çÀÚ´Â °ü·Ã ¹ý¿¡ ÀÇ°Å, ¿ì´ëÇÕ´Ï´Ù. (ÀÔ»ç È®Á¤½Ã ÃßÈÄ Áõºù Á¦Ãâ)
*´ç»ç´Â ¡®Ã¤¿ëÀýÂ÷¹ý¡¯¿¡ ÀÇ°Å, ä¿ë °úÁ¤ Áß ¾÷¹«¿Í ¹«°üÇÑ ÀÏüÀÇ °³ÀνŻóÁ¤º¸¸¦ ¹¯°Å³ª ¿ä±¸ÇÏÁö ¾Ê½À´Ï´Ù. *
[ä¿ëÀÏÁ¤]
2023.12.04 ~ ä¿ë ½Ã ¸¶°¨(¼ö½Ã ä¿ëÀ¸·Î ¼·ù Á¦Ãâ ¼øÀ¸·Î °ËÅäµÇ¸ç, ºü¸£°Ô ä¿ëÀÌ ¸¶°¨µÉ ¼ö ÀÖ½À´Ï´Ù.)
* Áö¿ø ÈÄ 30ÀÏ À̳» ¼·ùÀüÇü °á°ú ¹Ì Å뺸½Ã ¼·ù ÀüÇü Å»¶ôÀ¸·Î °£ÁֵǸç, ÃÖÁ¾ ÀüÇü °á°ú´Â ÀüÇü ¸¶°¨ ÈÄ WorkdayÀÚü ä¿ëÆäÀÌÁö¸¦ ÅëÇØ °íÁöµË´Ï´Ù.
[ä¿ë°úÁ¤]
¼·ùÀüÇü -> ä¿ë´ã´çÀÚ Contact -> Business ÀÎÅÍºä ¹× HQ ÀÎÅͺä(ÃÖ¼Ò 2ȸ ÀÌ»ó) -> Background ¹× Reference Check(Official) -> On-Boarding
(*»óȲ¿¡ µû¶ó ÀýÂ÷´Â Ãß°¡ ¹× º¯°æµÉ ¼ö ÀÖ½À´Ï´Ù.)
[ÀÎÀç¸ðÁý ¾÷ü °ü°èÀÚ´Â ¾Æ·¡ ³»¿ëÀ» ÁÖÀÇÇÏ¿© ÀоîÁÖ¼¼¿ä]
Inspire Integrated Resort Co., Ltd.,´Â ¿ÀÇ µÈ Æ÷Áö¼Ç¿¡ ´ëÇØ ÀÇ·ÚÇÏÁö ¾ÊÀº ÀÎÀç¸ðÁý¾÷ü(ÇìµåÇåÅÍ, ¼Ä¡Æß µî)ÀÇ µµ¿òÀ» ¹ÞÁö ¾Ê½À´Ï´Ù. ÇØ´ç Æ÷Áö¼Ç¿¡ ´ëÇÑ À¯È¿ÇÑ ¼¸é ÀÇ·Ú ¿äû ¾øÀÌ ÀÎÀç¸ðÁý ¾÷ü°¡ ÀÚÀÇÀûÀ¸·Î ´ç»çÀÇ Á÷¿ø¿¡°Ô Á¦ÃâÇÑ ¸ðµç À̷¼´Â ´ç»çÀÇ Àç»êÀ¸·Î °£Áֵ˴ϴÙ. ¶ÇÇÑ ±âÁ¸¿¡ ´ç»ç¿Í °è¾àÀÌ Ã¼°áµÈ ÀÎÀç¸ðÁý¾÷ü¶ó ÇÏ¿©µµ Á÷Á¢ÀûÀ¸·Î ¼¸é ÀÇ·ÚÇÑ Á÷À§¿¡ ´ëÇؼ¸¸ À¯È¿Çϸç, ±×·¸Áö ¾ÊÀ» °æ¿ì ´ëÇà¾÷ü°¡ ÃßõÇÏ¿© ´ç»ç°¡ °í¿ëÇÑ Èĺ¸ÀÚ°¡ ÀÖ´õ¶óµµ ¼ö¼ö·á°¡ Áö±ÞµÇÁö ¾ÊÀ½À» À¯³äÇÏ¿© Áֽñ⠹ٶø´Ï´Ù.
#LI-JA1