
Information Security Engineer
CSG
full-time
Posted on:
Location Type: Remote
Location: United States
Visit company websiteExplore more
Salary
💰 $90,035 - $144,054 per year
About the role
- Implement, update, troubleshoot, and maintain our SIEM and SOAR security solutions.
- This will include implementing logging infrastructure, identifying automation opportunities, and defining security systems requirements
- Analyze security systems and seek improvements via automation or otherwise, on a continuous basis
- Develop, document, and maintain security standards, technical documentation, and standard operating procedures
- Tune, filter, and customize security systems in coordination with Information Security Analysts
- Construct basic project plans based on requirements analysis
- Communicate project status to leadership and management, including wins, impediments, and basic metrics
- Participate and be an integral component of audit, compliance, and regulatory functions, including and not limited to: Payment Card Industry (PCI) Data Security Standard (DSS), Sarbanes-Oxley (SOX), emerging state and federal privacy laws, and general security auditing
- Participate in the organization's incident response plan and perform, reviews, and analyzes events/incidents on an as needed basis
- Act as information security subject matter expert and consult with fellow team members and those outside of the security organization to provide guidance and insight into solving basic to moderately complex security challenges
- Be willing to work outside normal business hours when needed to perform diagnosis and/or implementation of product releases or changes so that normal business workflow is not interrupted
- Be willing to travel both domestically and/or internationally up to 5%
Requirements
- A minimum of 3 years’ experience with Information Security
- Experience implementing and maintaining information security technologies, such as: IDS/IPS, malware prevention, database activity monitoring, secure password repository, multi-factor authentication, SIEM, email protection, web content filtering, IdM/IAM, encryption and encryption key management, DLP, change detection, and vulnerability scanners
- In-depth knowledge of TCP/IP: must be able to demonstrate technical understanding of all layers of the TCP/IP stack, including familiarity with major application-layer protocols such as HTTP, HTTPS, FTP, SFTP, FTPS, SMTP, DNS, etc.
- The ability to read and understand a packet trace and interpret network access control lists
- An in-depth understanding of a variety of network and application attacks: examples include DoS/DDoS, buffer overflows, SQL injection, reconnaissance scanning, and evasive methods attackers use to avoid detection
- The ability to demonstrate a minimum level of familiarity with well-known vulnerabilities and exploits
- A working knowledge with IT security, compliance, and regulatory requirements, such as: Payment Card Industry (PCI) Data Security Standard (DSS), Sarbanes-Oxley (SOX), Healthcare Information Privacy Protection Act (HIPPA), state and Federal privacy laws
- One or more of the following certifications is a plus! Global Information Assurance Certification (GCIH, GCFA, GREM), Offensive Security Certified Professional, (ISC)2 SCCP, (ISC)2 CISSP
- The ability to read, write, speak, and understand the English language in a business environment.
Benefits
- Work from Home
- Employee Belonging Groups
- Healthcare: Dental, Medical, and Vision
- Paid Vacation, Volunteer, and Holiday Time Off
- And so much more!
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
SIEMSOARIDSIPSmalware preventiondatabase activity monitoringmulti-factor authenticationencryptionvulnerability scannersTCP/IP
Soft Skills
communicationproject managementproblem-solvingteam collaborationadaptability
Certifications
GCIHGCFAGREMOffensive Security Certified Professional(ISC)2 SCCP(ISC)2 CISSP