Sr. Security Engineer Engineering - New York City, NY at Geebo

Sr. Security Engineer

We are looking for a Sr. Security Engineer with experience assessing, designing, and implementing solutions.Experience designing, and executing security controls is also needed. Experience in Cloud Security (Azure AD and M365) is also needed.Full-time/Permanent role with benefitsLocation:
NYC - Hybrid Remote - 3 days/week onsite.
Responsibilities:
- Performing continuous monitoring of the Firm's information security systems, technologies, processes, and procedures, analyzing the findings, and communicating exceptions, concerns and remedial steps to the Director of Security Engineering, and/or Chief Information Security Officer as necessary;- Cloud security design, implementation, and security control management with regular security assessments, monitoring and audits of cloud infrastructure.- Promptly reporting any and all exceptions to policies, procedures, and operational standards to the Director of Security Engineering, and/or Chief Information Security Officer as necessary; - Executing the Firm's information security threat management process, ensuring all aspects of an event are documented and remediated, and communicated to the Director of Security Engineering, and/or Chief Information Security Officer as necessary;- Developing and sustaining an operationally efficient Vulnerability Management Process.- Providing customized reports with actionable information to assist with the resolution and completion of activities related to asset vulnerabilities, articulate the current state of vulnerabilities within the enterprise or provide detailed trending of current and historical data designed to highlight changes in security posture and work accomplished.- Assist in monitoring and analyzing security relevant logs, events, and alerts including, but not limited to, logs from systems, applications, SIEM, AV, Firewalls, file systems, and IPS; document relevant incidents and suggest/co-ordinate appropriate remedial actions.- Reviewing all operational, hardware, and software changes that may impact the firm's standard information security posture.- Participating in projects, programs, and initiative to ensure implementation of and adherence to the Firm's information security technology policies, procedures, processes, and technologies. - Coordinating upgrades, administration and troubleshooting support for all information security products in the Firm's information processing environment, submit and monitor product support requests, coordinate troubleshooting efforts, and drive the Firm's standard issue resolution process to conclusion.- Providing consultative direction and advice regarding to information security architectural standards, technologies, policies, and procedures for all Firm offices and facilities.- Exhibiting the ability to think and act strategically as well as tactically, utilizing and developing interpersonal and written and verbal communication skills to effectively support the Firm's global information security functions.- Demonstrate calm, logical, analytical decision-making abilities and possess good interpersonal and communication skills. - Must work well under pressure and be able to coordinate project work with others inside and outside the department. Able to respond to and remediate information security events that arise unpredictably and have a good overall understanding of the required work to maintain a highly secure environment.
Qualifications:
- Good working knowledge of the industry standards, policies, processes, procedures, guidelines and currently available technologies applicable to maintaining and supporting a mature information security program.- Substantial knowledge in python and PowerShell scripting for security system integration and automation.- Sound analytical and operational judgment, the use of tact in daily and stressful situations, and sound analytical rigor applied to supporting and remediating events in the Firm's information security systems, processes, and procedures.- Good interpersonal, communication, organization, collaboration, and team-building skills.- Able to work effectively with internal resources, partners, administrators, clients -and other management personnel.- Substantial knowledge of and experience in two or more of the core security domains including, but not limited to, the following:
Endpoint protection, Incident response, IAM, Security Operations, Application and Data security, Infrastructure, Virtualization, Mobile Security, and cloud monitoring.- Substantial experience in designing and deploying information technology and solutions in one or more of the core domains:
o Endpoint protection o Incident Response o Malware Analysis o Application and Data security o Infrastructure and Endpoint o Security Intelligence / SIEM- Solid understanding and significant experience working with structured design methodologies.- At least 5 to 7 years' experience in one or more security domain, proven track record of implementing and operating information security systems and working in projects related to the core domains applicable to information security architecture. - Bachelor's degree in engineering or computer Science a plus.- 8-10 years of progressive relevant hands-on IT experience. Recommended Skills Administration Architecture Assessments Auditing Automation Cloud Computing Security Apply to this job. Think you're the perfect candidate? Apply on company site $(document).ready( function() $(#ads-desktop-placeholder).html(
n
n
n Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.