General information

Security Office
Job ID

Description & Requirements

Position Summary:

The Senior security analyst will run the various scans required of LMRK, FSM, HRT and LSF.  These include the weekly code scans, daily  host vulnerability scans, regular application scans, and the bi-annual penetration tests and  system hardening.  Expectation is analysis of all errors, address the needed remediations internally or coordinate with respective development teams for proper intervention, and comply with the regular audits and reports mandated by the Infor Security Office.

A Day in The Life Typically Includes:

The Security Analyst, Senior will be involved in coding, designing, technical presentations, mentoring, fixing bugs, unit testing, vulnerability assessment, penetration testing, documentation, and troubleshooting. The position belongs to a development team that helps in maintaining the good security posture of the software.

  • Performs design, implementation and maintenance of single product modules/sub-systems or on lower level issues of multiple products.
  • Performs somewhat complex bug verification, release testing and beta support for assigned products.
  • Conducts vulnerability assessment and security tests.
  • Researches and implements software security components and vulnerability mitigation
  • Prepares & conducts the unit testing and integration testing for functionality and limits
  • Coordinates with QA and technical support engineers when conducting defect research and maintaining the software

What You Will Need:

Basic Qualifications:

  • Bachelor's degree in software engineering, computer science, or related degree is a must
  • 5 years of work experience as a Security Analyst, Security Engineer, or related position is a must
  • 1 year cumulative experience in coordination or project management is a must
  • Understanding of security vulnerabilities is a must
  • Experience in writing test plans and test reports would be preferred
  • Experience in vulnerability assessment and/or penetration testing using OWASP ZAP, BurpSuite, Nessus, Veracode, Rapid7, Qualys, Tenable, or other tools would be preferred

What Will Put You Ahead?

Preferred Qualifications:

  • Familiarity with vulnerability assessment and software security

Infor Values:

Our Guiding Principles set the standard for how we work with one another. They define who we are as an organization and guide everything we do. By applying the same shared values that unleash prosperity in free societies—such as value creation, integrity, responsibility, free speech, and toleration—we encourage one another to take initiative and to challenge the status quo.


We have a relentless commitment to a culture based on a business philosophy called Principle Based Management™ (PBM™). Informed by the principles that allow a free and open society to flourish, PBM™ prepares individuals to innovate, improve, and transform while fostering a healthy, growing organization that creates long-term value for its clients and supporters and fulfillment for its employees.