Security Threat Engineer

Must be eligible for DIRECT HIRE without sponsorship.
The IT Security Threat Engineer is responsible for developing, deploying, monitoring, tuning, evaluating, reporting and maintaining systems and procedures; to identify and mitigate threats to the corporate network, corporate assets, and corporate users.
This team member will collect threat intelligence, perform threat analysis, implement threat mitigation, and disseminate threat information.
The team member will evaluate security standards, guidelines, and procedures relating to firewalls, intrusion detection, vulnerability scanning, host operating systems, and network devices.
o Engineer, designs, install, and support security technologies such as Security Incident and Event Managers (SIEM), Intrusion Detection and Prevention Systems (IPS), Endpoint Security, Data Loss Prevention (DLP), Vulnerability Management (VM), Threat Intelligence, Threat Detection, Web Application Firewalls (WAF), Email Gateways, Breach Mitigation, Certificate Management, SSL encryption and decryption, Identity Management, Cloud Security, Database Security, Web Gateways, VPNs, and Firewalls.
o Communicate critical threats and remediation efforts for the enterpriseo Perform analysis of system logs to identify unauthorized use or access.
o Conduct sensitive investigations of user behavior, that will withstand legal scrutinyo Creation, analyze, and communicate of security metrics to senior leadershipo Securely manage key and file management infrastructure, in accordance to policy and procedureso Designs and monitor secure access to the network infrastructure, including routers, switches, and access points.
o Participate in emergency response team activities for responding to various security incidents.
o Provide in-depth support for information security incidents including internal violations, hacker attacks, virus, and system outages.
o Prepare and update information procedures, standards, and/or other technical requirement documents.
o Act as a technical resource to department management and others within the company who are seeking more information about security.
o Participate in periodic information systems risk assessments.
o Develop detailed proposals and plans for new information security systems that would enhance or enable new capabilities for network or host systems.
o Recommends and evaluates security tools to identify more efficient and effective security measures.
Knowledge o Advanced technical skills and hands on experience in information security as it relates to server security, client security, user security, network communications, and data storage.
o Practical experience with database security, content filtering, vulnerability scanning, and anti-malware, log retention, security intrusions, data loss, data privacy, regulatory requirements, o Advanced knowledge of the TCP/IP protocol suite, DHCP, DNS, LAN/WAN, and Operating System concepts.
o Advanced knowledge of packet capture methods and analysis of network flowso Advanced knowledge of the OSI model and security that is associated with each layer.
o Advanced knowledge of wide area network security as it pertains to networking protocols and connectivity to/from outside resources o Strong network security knowledge to include Remote access - VPN, Firewalls, DMZ architecture, network monitoring, intrusion detection, web server security, and wireless security.
Skillso Experience in setting appropriate priorities for tasks to be accomplished based on project plans and management priorities are required.
o Good interpersonal, verbal and written communication skills.
o Detail oriented with good time and analytical skills.
o Ability to exercise prudent judgment and offer knowledgeable advice.
o Ability to work both independently and in a team environment.
o Ability to manage multiple projects and tasks.
o Ability to manage production sensitive situationso Be a reputable representative of the department Experienceo Has 5 to 7 years in networking or IT Security with a large corporation.
o Hands on experience supporting security requirements of a large, global enterprise environment.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Security- House of Blues
Music Hall/Event Security- House of Blues
HOB Houston - Production - Sound Engineer
Door Host / Security - Music Hall
Foundation Room Security
Account Supervisor, Technology and Cyber Security
Austin, TX FleishmanHillard