Loading

Banner Image
  • Location

    Kennesaw, Georgia

  • Job title:

    Information Security Engineer

  • Sector:

    Technology

  • Job type:

    Direct Hire

  • Job ref:

    5882

Information Security Engineer

 

Overview

You’ll be part of an integral team implementing, supporting, and testing the security solutions in a dynamic environment. No two days will be the same, as you will work through technical security incidents, manage our current security tools including: database firewall infrastructure, web content filtering technologies, VPN/network gateway infrastructure, security firewalls, corporate security policies. Responsible for procedures to protect information systems assets from intentional or inadvertent modification, disclosure or destruction.

 

Requirements

  • Bachelor’s degree in Computer Science, MIS or Technology Forensics or related technical field; or equivalent work experience.

  • 5+ years of hands-on experience with a focus in areas such as systems, network, or information security / cybersecurity

  • Strong understanding of Virtualization (VMware, Hyper-V and hosting IIS, SQL, .NET) framework

 

We’d love to see

  • Deep understanding of network topologies (Palo Alto PAN-OS /Cisco) and the flow of traffic between numerous networking devices, protocols, and the ability to discover security gaps between such devices.

  • Ability to conduct light penetration testing to discover security flaws or gaps that may exist.

  • Deep understanding of SIEM/log aggregation and developing dashboards to quickly and effectively discover anomalies through the correlation of events and logs.

  • Strong experience with technologies, networks security tools and protocols including firewalls, DNS, DMZ, and VPN.

  • Experience in maintaining, configuring and troubleshooting a SIEM infrastructure.

  • Including creating and maintaining alarm rules, use cases, filters, dashboards, and reports to identify malware activity, misconfigurations, and/or anomalies.

  • Subject matter expertise to IT Compliance during IT internal and external audits like PCI, SOC and PII

  • Ability to analyze data, such as logs or packets captures, from various sources within the enterprise and draw conclusions regarding past and future security incidents as well correlate incidents using the Cyber Kill Chain, or attack path methodology to report to upper management

  • Scripting skills such as Python, Perl, Shell, Bash.•Information Security professional certifications such as CISM, GMON, CEH, ECIH, GCFA

 

Responsibilities 

  • Overseeing security incident & event monitoring, suspicious activity report investigation, incident handling, escalations and document incidents from initial detection through final resolution.

  • Create after action reporting to drive lessons learned.

  • Mentor non security teams regarding risk management, information security controls, incident analysis, incident response, SIEM monitoring, and other operational tasks (tools, techniques, Procedures) in support of technologies managed by the Security Operations Center.

  • Serve as one of the escalation points for cybersecurity incidents not resolved at the L1/L2 levels.

  • Work with Security Engineer providing forensic analysis in support of investigations including evidence seizure(artifacts) and data recovery.

  • Ensure security measures are operational while continuing to meet established security policies and standards.

  • Perform Threat Hunting to detect advanced threats that evade traditional security solutions and develop alarm use cases. Perform vulnerability analysis and penetration testing functions to detect system potential intrusions and ensure only authorized access to all systems.

  • Lead and plan IR table top exercises and assist with the creation and refinement of Incident Response Run books.

  • Identifying key Indicators of Compromise (IOCs) from new or unknown malware and developing rules and signatures for detection Assessing security risks to the organization's information and communications systems.

  • Research the latest information security trends to understand the latest vulnerabilities and threats.

  • Providing artifacts to Governance Risk & Compliance in relation to internal & external audits.

#LI-TP1

ehire.com/jobs

A human approach to staffing.

 

Our Company is committed to the principles of equal employment. We are committed to complying with all federal, state, and local laws providing equal employment opportunities, and all other employment laws and regulations. It is our intent to maintain a work environment which is free of harassment, discrimination, or retaliation because of sex, gender, race, religion, color, national origin, physical or mental disability, genetic information, marital status, age, sexual orientation, gender identity, military service, veteran status, or any other status protected by federal, state, or local laws. The Company is dedicated to the fulfillment of this policy in regard to all aspects of employment, including but not limited to recruiting, hiring, placement, transfer, training, promotion, rates of pay, and other compensation, termination, and all other terms, conditions, and privileges of employment.