• $94,810.00 -139,430.00/year*
  • Coraopolis , PA
  • Information Technology
  • Full-Time
  • 112 Nyetimber Pkwy


The Sr. Infrastructure Security Engineer is a senior, trusted advisor in global Information Security team focusing on the key values critical to our success - Partnership with the Business, Agility, Sense of Urgency and Innovation. This position plays an integral role in defining and assessing the organization's security strategy, architecture and practices as well as contributes to maturing the company's infrastructure security architecture and technology frameworks. As part of a global team, this position will help shape security in support of current and new business initiatives and grow the company.

Sets the direction and design as well as leads the implementation of enterprise-class security systems and data protection strategies
Participates in the development of the global, enterprise technology architectural framework
Interprets business, technology and threat drivers and develops practical security roadmaps
Creates, maintains and updates architecture designs and models
Researches and defines new and emerging security technologies, services, protocols and standards according to industry best practice, business requirements and company policy
Identifies security design gaps in existing and proposed architectures and recommends changes or enhancements to existing processes or systems
Influences changes to company standards based on emerging technologies, changing business drivers, emerging threats and risk
Partners with the internal operations teams to deliver solutions and manage change
Ensures all new technologies are effectively transitioned to internal teams to operate and maintain the technology
Validates infrastructure and other reference architectures for security best practices and recommend changes to enhance security, reduce risks or increase business productivity
Validates security configurations and access to security infrastructure tools
Provides advisory services to the business to solve business problems
Monitors industry security updates, changes, technologies, emerging threats and best practices for continuous improvement
Establish and analyze alerting thresholds/triggers for security technologies
Performs initial incident triage, determining scope, urgency, and potential impact of security incidents
Adjusts incident response procedures and trains internal teams to respond to them
Provides engineering support for security incidents and threats
Coordinates with internal support teams as required to validate alerts, ensure incident resolution, and perform root cause analysis
Performs forensic analysis on known security vulnerabilities and recommend risk mitigation procedures

A minimum of five years of progressive experience leading the design and implementation of information security solutions in a complex enterprise environment
Demonstrated technical experience delivering security infrastructure solutions for compute, endpoint and mobile security
Proven record of demonstrating values of success: Partnership with the Business, Agility, Sense of Urgency and Innovation
Strong working knowledge of operating system security, e.g. Windows and Linux
Working knowledge of incident response, threat modeling and mitigation
Working knowledge of common information security management frameworks, such as ISO 27001/2, ITIL, COBIT or NIST
Demonstrated effectiveness working across multiple business units to deliver results
Ability to lead and motivate cross-functional, interdisciplinary teams to achieve tactical and strategic goals
High degree of integrity, initiative, dependability and ability to work with little supervision
Passion for delivering the best customer experience both internally and externally
Ability to effectively respond to dynamically changing work environment and to positively influence business outcomes
Excellent collaboration, interpersonal, and presentation skills
Ability to effectively communicate complex technical information to various audience levels

Bachelor's degree in Information technology or similar field preferred
Six or more years of progressive experience leading the design and implementation of information security solutions in a complex enterprise environment preferred
Experience with software development and engineering business trends and requirements
Industry certifications related to information security a plus
Experience delivering security solutions for high-compute, fast-paced businesses
Experience working with AWS, Azure or Google Cloud platforms
Working knowledge of SIEM technologies, cloud security, application security, network security and disaster recovery
Working knowledge of change management, configuration management, incident and problem management
Working knowledge of delivery methodologies such as Lean, Agile, SDLC, etc
Intermediate to expert skills with the Microsoft Office suite: Word, Excel, PowerPoint, Visio


Culture and values are incredibly important to ANSYS. They inform us of who we are, of how we act. Values aren't posters hanging on a wall or about trite or glib slogans. They aren't about rules and regulations. They can't just be handed down the organization. They are shared beliefs - guideposts that we all follow when we're facing a challenge or a decision. Our values tell us how we live our lives; how we approach our jobs. Our values are crucial for fostering a culture of winning for our company:
Customer focus
Results and Accountability
Transparency and Integrity
Sense of urgency
Collaboration and Teamwork

ANSYS is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, and other protected characteristics.

ANSYS does not accept unsolicited referrals for vacancies, and any unsolicited referral will become the property of ANSYS. Upon hire, no fee will be owed to the agency, person, or entity.


by Jobble

Associated topics: attack, forensic, identity access management, idm, information security, leak, protect, security, security engineer, vulnerability
Associated topics: identity, identity access management, idm, information assurance, information security, leak, malicious, security, threat, violation

* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.

Launch your career - Upload your resume now!

Loading some great jobs for you...