Position Overview
The security engineer is responsible for implementing, maintaining, monitoring and managing secure solutions. The engineer delivers these solutions in accordance with the organization’s architectural designs, best practices, and regulatory or compliance requirements.
As risks change, the security engineer is responsible for recommending modifications and enhancements to ensure the organization is evolving with the threat landscape.
The security engineer is expected to contribute to the corporate security strategy with security leadership and other senior security staffers and technologists.
Recipients of the engineer’s implementations and management include IT infrastructure, application development, security operations, security audit and end users.
With an emphasis on securing systems, applications, third-party connections, service providers and ancillary systems, the security engineer is responsible for securing business-to-business initiatives, third-party relationships, outsourced solutions and vendors.
Considered a highly knowledgeable individual, the security engineer is expected to implement, monitor and manage secure solutions that address modern day issues.
Job Description
- Handle day-to-day implementation, monitoring and operational support of security hardware, software, customer applications, and managed solutions.
- Actively participate security team meetings that facilitate secure design.
- Engage in information security projects that evaluate existing security infrastructure and propose changes as defined by security leadership and architects.
Additionally, deliver projects on time and within budget.
- Assist with incident response and system stability issues as they occur. This may include involvement outside of regular work hours, and responsiveness is expected.
- Implement solutions observing compliance Health Information Portability and Accountability Act (HIPAA), Payment Card Industry (PCI), New York State Department of Financial Services Cybersecurity Requirements (23 NYCRR 500).
- Work in tandem with architects, the security operations center (SOC), incident responders (in cases of anomalous activity and host compromise), and technology infrastructure and development team members.
- Respond to and handle service and escalation tickets within SLA expectations.
- Develop security test plans from architectural design. Identify deficiencies and make enhancements to ensure production is not impacted.
- Participate in change project and change management meetings as required.
- Research, validate and deploy solutions meeting security and business needs.
- Follow security engineering fundamentals and processes as outlined in NIST 800-160
Influence the planning and execution of incident response and postmortem exercises, with a focus on creating measurable benchmarks to show progress (or deficiencies requiring additional attention).
- Focus on driving security efficiencies, enabling security team members to work on more advanced tasks.
- Conduct performance testing to stress the limitations of security solutions while at the same time ensuring business innovation and day-to-day processes are not negatively impacted.
- Perform other duties as assigned
Minimum Qualifications
- Bachelor’s degree in computer science, information assurance, Cybersecurity or related field, or equivalent.
- 10+ years of related experience required.
Licensure and / or Certification Required
CISSP (preferred); CISM and / or SANS certification or Cisco-related certifications a plus.
Professional Competencies
- Experience with : Microsoft Azure or Amazon Web Services (AWS). Vulnerability tools such as Rapid7, Qualys, Nessus, NMAP, Kismet, AirsnortSIEM platforms and technologies Private and Public PKI InfrastructureNetwork security management, design, and deployment.
- DevOps background with experience in compliance obligations.
- Experience with one or more of the following standard frameworks : ISO 27001, NIST, PCI Data Security Standard (PCI DSS), HIPAA, Health Information Technology for Economic and Clinical Health (HITECH) Act, Center for Internet Security (CIS) standards or Service Organization Controls (SOC) 2.
- Working knowledge of Windows and Linux.
- Familiarity with state privacy laws.
- Ability to think strategically and tactically, with effective decision-making skills.
- Highly trustworthy; leads by example.
- Experience supporting and utilizing SIEM platforms.
- Working technical knowledge of Advance Threat Protection tools such as Crowdstrike, Trellix, etc.
- Next Generation Firewalls (NGFW), Software-Defined Wide Area Networking (SD-WAN), Advanced Threat Protection and Sandboxing solutions.
- Detection / Prevention Systems : Anomaly-based, signature-based, and host-based.
- DLP and Data in rest encryption.
L-Hybrid