In this role, you will build out, maintain, and troubleshoot our information security systems while supporting internal customers. You will have the opportunity to learn multiple tools and technologies across multiple security domains.
In this role, you will:
- Deploy and maintain security tools and systems to secure our multi-cloud and on-premises environments.
- Implement security policy, standards, guidelines, processes, and procedures to ensure ongoing security posture.
- Provide expertise in security control configuration to business as needed.
- Develop documentation to support ongoing security systems operation.
- Develop, analyze, and implement security specifications.
- Participate in incident response and break/fix situations as needed.
- Analyze system services, operating systems, networks, and applications from a security perspective discovering security issues that appear under new threat scenarios.
- Create custom use cases, system alarms, correlation signatures, watch lists and 20 plus custom regex parsers to meet customer's IT security needs.
- Support onboarding and maintenance of a wide variety of data sources to include various OS, appliance, and application logs.
- Analyze security activity, develop visualizations/reporting, and represent risk to business stakeholders and management.
Requirements:
- 3+ years of experience in IT Security (some of these years can be in other IT fields), preferably from a product-based company
- Experience in Windows, Unix/Linux, and/or network administration experience.
- Experience with cloud security posture management (CSPM) tools.
- Experience in Managed identity and access management (IAM) in cloud environments
- Good understanding of information security threat landscape, and prior experience with threat modeling, including usage of relevant tools and technologies.
- Good problem solving and troubleshooting skills.
- Excellent interpersonal communication skills, with ability to work as a part of a team, as well as independently.
- Proficiency in English (verbal & written)
Nice to have:
- Experience working with SIEM technologies, threat hunting, and pen-testing tools and technologies, and working with malware analysis.
- Familiarity with automation and orchestration tools for cloud and on-premises environments.
- Understanding of networking principles and basic understanding of network protocols.
- Knowledge of basic functions of operating systems and containerization.
- Bachelor’s degree or equivalent security-related course