Cyber Security Operations Engineer
To see similar active jobs please follow this link: Remote System Administration jobs
This role can be remote, located anywhere in the continental US with minimal travel to the Bay area We are unable to sponsor for this permanent full-time role Prestigious Enterprise Company is currently seeking a Cyber Security Operations Engineer. Candidate will help implement the security operations technology road-map.. Candidate will be implementing, maintaining and configuring key security technologies and initiatives. Candidate will manage the Security tools and Incident Response alerts or events found within their tools set or from additional sources as well as identifying risk related to the Enterprise. Responsibilities Identifies gaps, makes plans, implements, updates, maintains, manages, monitors, and supports enterprise Security Tools. Leads device configuration management activities on all security technologies Critical intrusion or vulnerability detection tools. Security incident response activities as well as implementing tactical risk mitigation to incidents Actively protects the availability, confidentiality, and integrity of customer, employee, and business information. Provides vulnerability and threat management monitoring and mitigation response Contributes to Enterprise security team effectiveness by accomplishing additional security related results as needed Qualifications College degree in related technicalbusiness areas or equivalent work experience required. 7+years relevant work experience preferred. Solid understanding of technology, operations and key business processes. Member of SANS or other leading security organizations preferred. Proven change management skills. Highly flexible and able to adapt to change. 1 of the following Industry certificates CEH, CISSP, or OCSP required. Solid understanding of UNIX Linux operating systems. Solid Understanding of the common Unix and Windows utilities, diagnostic and monitoring tools. Scripting experience with Perl, Shell andor Java. Strong verbal and written communication skills. Strong organizational and interpersonal skills. Strong team player with proven collaboration skills. Strong critical thinking and problem solving skills. Proven change agent who consistently delivers results. Solid understanding of network protocols, LAN, WAN, SSL, Firewall, Load Balancer, and DMZ configurations. Understanding of the PCI (Payment Card Industry) data security standard and other regulatory concerns (SOX, FCRA, FISMA, etc.). Technical Skills Information Risk Management Content filtering technologies, application firewalls, vulnerability scanners, LDAP, SAML, forensics software, and security incident response. OS Linux (Red Hat, SUSE), Windows Desktop (XP, Win7, and Win10) and Server (2000, 2003, 2008, and 2012), and UNIX (HPUX, AIX, etc...). Network Firewall and Switching technologies (Cisco ASA, Juniper SRX, Checkpoint, etc...) OSI Model, VPN, IDSIPS, ProxyReverse Proxy, WAF, Two Factor Authentication, RADIUS, Netflow, Anti-SPAM, and Vulnerability ScanningReporting (Qualys, Rapid7, Nessus, NMAP, etc. ). Software Languages Perl, PowerShell, Python, and SQL. End Point Anti Malware, HIPS, Client based firewall, WhitelistingBlacklisting technologies, GPO, WMI, and BASH.
About the job
Cyber Security Operations Engineer
To see similar active jobs please follow this link: Remote System Administration jobs
This role can be remote, located anywhere in the continental US with minimal travel to the Bay area We are unable to sponsor for this permanent full-time role Prestigious Enterprise Company is currently seeking a Cyber Security Operations Engineer. Candidate will help implement the security operations technology road-map.. Candidate will be implementing, maintaining and configuring key security technologies and initiatives. Candidate will manage the Security tools and Incident Response alerts or events found within their tools set or from additional sources as well as identifying risk related to the Enterprise. Responsibilities Identifies gaps, makes plans, implements, updates, maintains, manages, monitors, and supports enterprise Security Tools. Leads device configuration management activities on all security technologies Critical intrusion or vulnerability detection tools. Security incident response activities as well as implementing tactical risk mitigation to incidents Actively protects the availability, confidentiality, and integrity of customer, employee, and business information. Provides vulnerability and threat management monitoring and mitigation response Contributes to Enterprise security team effectiveness by accomplishing additional security related results as needed Qualifications College degree in related technicalbusiness areas or equivalent work experience required. 7+years relevant work experience preferred. Solid understanding of technology, operations and key business processes. Member of SANS or other leading security organizations preferred. Proven change management skills. Highly flexible and able to adapt to change. 1 of the following Industry certificates CEH, CISSP, or OCSP required. Solid understanding of UNIX Linux operating systems. Solid Understanding of the common Unix and Windows utilities, diagnostic and monitoring tools. Scripting experience with Perl, Shell andor Java. Strong verbal and written communication skills. Strong organizational and interpersonal skills. Strong team player with proven collaboration skills. Strong critical thinking and problem solving skills. Proven change agent who consistently delivers results. Solid understanding of network protocols, LAN, WAN, SSL, Firewall, Load Balancer, and DMZ configurations. Understanding of the PCI (Payment Card Industry) data security standard and other regulatory concerns (SOX, FCRA, FISMA, etc.). Technical Skills Information Risk Management Content filtering technologies, application firewalls, vulnerability scanners, LDAP, SAML, forensics software, and security incident response. OS Linux (Red Hat, SUSE), Windows Desktop (XP, Win7, and Win10) and Server (2000, 2003, 2008, and 2012), and UNIX (HPUX, AIX, etc...). Network Firewall and Switching technologies (Cisco ASA, Juniper SRX, Checkpoint, etc...) OSI Model, VPN, IDSIPS, ProxyReverse Proxy, WAF, Two Factor Authentication, RADIUS, Netflow, Anti-SPAM, and Vulnerability ScanningReporting (Qualys, Rapid7, Nessus, NMAP, etc. ). Software Languages Perl, PowerShell, Python, and SQL. End Point Anti Malware, HIPS, Client based firewall, WhitelistingBlacklisting technologies, GPO, WMI, and BASH.