Information Security Engineer
Stamford, CT
Bounteous
We co‑innovate with the world’s most ambitious brands to create transformative digital experiences. Learn more about our work and our unique co-innovation model.Bounteous x Accolite brings together 5000+ employees spanning North America, APAC, and EMEA, and partnerships with leading technology providers. Through advanced digital engineering, technology solutions, and data-driven digital experiences, we create exceptional and efficient business impact and help our clients win.
Position: Information Security EngineerStart Date: - ImmediateMinimum Term: - 6 months, renewable
Requirement Description:-Information Security engineer to support our Global Security Services group, with a primary focus on implementing and operating on proactive defenses.
The Security Engineer leverages extensive experience in information systems and security by closely working with Security and other IT practice leads to ensure our tools and agents are properly configured, fully deployed, and operating as expected. The role entails research, testing and implementation of new solutions and operation and maintenance of current solutions. Key performance indicators include percent coverage, health of tooling and related operations, recurrence of known issues and attainment of security risk targets.
Candidate must have strong hands-on technical background, and must demonstrate operational, engineering and security expertise at all layers of the OSI stack. Candidate must be highly collaborative and is expected to partner effectively with other teams. Candidate must be able to efficiently diagnose and anticipate issues based on deep knowledge of the operating environment, standard technology stacks and operating systems, and acquired expertise in the subject security solutions. Candidate is expected to apply creative thinking and programming expertise to automate routine and recurring work. Candidate must apply appropriate abstractions to ensure long-term viability and operability of solutions they implement.
Specific responsibilities:
- Strong conceptual thinking and communication skills - the ability to translate complex business and technical requirements into effective and comprehensible solutions.
- Apply strong logic and principles-based reasoning to define solutions and justify proposals.
- Work closely with other IT Engineers and staff to ensure that security solutions are implemented and operating as required.
- Serve as lead Splunk / SOC engineer managing the SIEM(s) and related data flows.
- Devise and implement means to provide transparency about health of security platforms and services.
- Lead or support projects as required to implement new security solutions or upgrade incumbents.
- Maintain deep expertise in the growing body of IT security vulnerabilities, threats, exploits and mitigations.
- Serve as lead engineer supporting security infrastructures.
- Acts as a key member of the CSIRT.
Experience/Skills Required(5-10 years):
- Familiarity with NIST and ISO 27000 security practice frameworks.
- Extensive hands-on experience with Splunk and other security infrastructures (e.g. Firewalls, IDS/IPS, Proxies, Microsegmentation )
- Extensive hands-on experience operating one or more common IT infrastructures ( Telecom, database, Windows and *NIX systems, virtualization platforms )
- Proficiency with scripting / programming languages ( e.g. Python, Powershell )
- Familiarity with relevant international and U.S. regulations such as NYDFS, SOX, GDPR, DORA.
- The following are not essential, but are highly valued;
- Professional experience in application or infrastructure penetration testing
- Demonstrable expertise with configuration automation practices and toolchains (e.g. Chef, Puppet, Ansible, etc…)
- Demonstrable experience creating, securing and managing Cloud infrastructures (e.g. Azure, AWS)
- Familiarity with a relevant enterprise Architecture methodology (e.g. Zachman Framework, TOGAF).
- Bachelor's or master's degree in computer science, information systems or other related field, or equivalent work experience.
- Professional security management certification, such as a ISC(2) Certified Information Systems Security Professional (CISSP), SANS GIAC Information Security Professional (GISP), GIAC-Security Expert (GSE), or GIAC Certified Enterprise Defender ( GCED )
Education:
Research shows that women and other underrepresented groups apply only if they meet 100% of the criteria of a job posting. If you have passion and intelligence, and possess a technical knack (even if you’re missing some of the above), we encourage you to apply.
Bounteous x Accolite is focused on promoting an inclusive environment and is proud to be an equal opportunity employer. We celebrate the different viewpoints and experiences our diverse group of team members bring to Bounteous x Accolite. Bounteous x Accolite does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, physical or mental disability, national origin, veteran status, or any other status protected under federal, state, or local law.
In addition, you have the opportunity to participate in several Team Member Networks, sometimes referred to as employee resource groups (ERGs), that host space with individuals with shared identities, interests, and passions. Our Team Member Networks celebrate communities of color, life as a working parent or caregiver, the 2SLGBTQIA+ community, wellbeing, and more. Regardless of your respective identity, there are various avenues we involve team members in the Bounteous x Accolite community.
Bounteous x Accolite is willing to sponsor eligible candidates for employment visas.
#BI-Remote#LI-Remote
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics Ansible Automation AWS Azure Business Intelligence CISSP Cloud Computer Science CSIRT Exploits Firewalls GCED GDPR GIAC IDS IPS ISO 27000 NIST Pentesting PowerShell Puppet Python SANS Scripting SIEM SOC SOX Splunk Strategy TOGAF Vulnerabilities Windows
Perks/benefits: Health care
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.