A good candidate has a deep passion for security and a desire to help develop a security mindset in others. The role also requires a strong ability to work with incomplete information and to adapt to changing priorities.
PRIMARY RESPONSIBILITIES:
- Responsible for upholding F5s business code of ethics & for promptly reporting violations of the code or other company policies
- Monitors security issues in order to identify and act upon them as they occur
- Participate in tier 2 and tier 3 security support
- Provide expert incident handling and drives both attack analysis and mitigation options
- Provides F5 customers with high-quality support experience
- Manages multiple issues and prioritizes based upon customer and business needs, without direction
- Effectively engages supporting escalation personnel, without direction
- Ensure complete and clear incident documentation
- Maintain incident documentation, participate in post-mortems, and write incident reports.
- Continuous research into emerging threats and mitigation options
- Independently develops and deliver security content and training based on research and testing within the security field and with F5 products to drive security mindset.
- Perform general security awareness and specific security technology training
- Engages in on-going training within the security field and with F5 products
- Follows processes defined in F5’s Quality Management System (QMS)
- Work closely with others to develop incident response plans
- Identify the gaps between the security incident response process and customers' needs, optimize/improve the workflow/process
- Act as the technical lead, identify the knowledge/technical skill gaps in the team, develop a training plan for the team, mentor/train other members of the team
- Identify trends and/or common knowledge gaps and ensure they are documented via the KCS Solve Loop
- Ensure that security related knowledge is documented within KCS and represent Security within the KCS Evolve Loop, for example RCA feedback into product design & documentation
- May lead projects and provide guidance/training to less experienced staff, mentoring.
- Perform expert threat and vulnerability management, monitoring of CVE and vendor notifications
- Evaluate and execute cross-functional security initiatives across the enterprise.
- Work with cross functional Engineering teams to ensure all systems are properly remediated according to our policies and standards.
- Lead steering committee(s) to analyze vulnerabilities and their impact to assess risk ratings
- Provide strategic security analytics metrics and reports.
- Provide security-related metrics for all levels including executive-level dashboards to demonstrate process effectiveness and remediation across the enterprise
- Effectively communicate and document risks related to the vulnerability environment and appropriate levels of urgency to management and engineering staff
- Represent Information Security on organizational project teams and ensure adherence to existing security policies and standards.
- Work closely with Incident Response and Risk Management teams and leverage corporate tools to provide supporting documentation for remediation prioritization and emergency security coverage.
- Ability to think with a security mindset. The successful candidate has a strong IT background with in depth knowledge of several key security practice areas: application security; network security, infrastructure security.
QUALIFICATIONS:
- Minimum of 15 years experience in a technical security role such as support, monitoring or consulting (e.g. pen testing) working with relevant technologies
- Information security subject matter expert
- Expert understanding of industry standards such as CVE, CPE, and CVSS
- Strong understanding of security frameworks and NIST standards
- Appropriate security based qualification; CISSP, GCIH (or demonstrated skills and ability to obtain certification) – more than one certification preferred.
- Public cloud certifications (or demonstrated skills and ability to obtain certification)
- Expert experience with security incident handling processes, procedures and methodologies.
- Expert technical experience with identifying and mitigating a breadth of attacks such as DDoS, web application, DNS and other network attacks.
- Expert knowledge with common security vulnerabilities and the ability to judge their severity
- Expert experience with working security incidents at corporate production environments
- Experience working with network and packet analysis tools
- BA/BS degree or equivalent experience
- Expert knowledge with Web Application Firewalls, Firewalls and IPS/IDS
- Expert experience with network vulnerability scanners
- Expert OS hardening and security best practices
- Knowledge of common Malware types and infection vectors
KNOWLEDGE, SKILLS AND ABILITIES
- Hands on technical experience with and very knowledgeable on LAN/WAN operations, and/or networking hardware required
- CVE and CERT experience
- Expert knowledge of security offensive/defensive techniques and methodologies.
- Expert understanding of security attack/defense methodologies (e.g. DNS, network TCP/IP, SSL and HTTP)
- Intermediate understanding and working knowledge of TCP/IP, SSL, DNS, HTTP and common protocols.
- Coding experience – having, in addition to Python, knowledge in other scripting languages
- Understanding of the underlying mechanisms for security vulnerabilities at a code and assembly level, e.g. buffer overflows, input sanitisation
- Knowledge of network and security monitoring tools
- Familiarity with load balancers, WAF’s and common network architectures
- Working knowledge of standard UNIX/Linux command line tools
- Hands-on technical experience with public clouds (e.g. AWS, Azure or GCP), and container-based deployments and orchestration tools (e.g. Kubernetes, Docker, Terraform and Ansible)
- Knowledge of microservice architecture, modern application architecture and API security
- Ability to generate new training and knowledge sharing content via various delivery method
- Able to work with moderate supervision
- Proven track record in a team environment
- Analytical thinker with strong attention to detail
- Must be able to read, write and speak English fluently, including technical concepts and terminology.
- Must be able to relay technical information to customers with varying skill levels
- Ability to create attack Proof of Concepts
- Experience with incident tracking software, Seibel experience a plus
PHYSICAL DEMANDS AND WORK ENVIRONMENT:
Duties are performed in a normal office environment while sitting at a desk or computer table. Duties require the ability to utilize a computer, communicate over the telephone, and read printed material. Duties may require the ability to travel via automobile or airplane, approximately 20% of the time spent traveling.Some datacenter/lab work as well.Duties may require the ability to lift 50 lbs enabling them to rack our controllers in customer locations or our lab. This role may require work outside of core business hours, including early morning, late evening, overnight, weekends, and/or holidays as needed. There will be a requirement to participate in an on-call rotation
Some travel may be required, a current passport is required
This role is regional – Americas, EMEA and APJ.
The Job Description is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change.