Expoint - all jobs in one place

The point where experts and best companies meet

Limitless High-tech career opportunities - Expoint

Amazon Security Engineer Healthcare Healthsec 
United States, Massachusetts, Boston 
327843485

14.08.2024
DESCRIPTION

Key job responsibilities
As a security engineer, you will/may:
Develop, test, review, debug, or deploy code that supports security protocolsAssess risks that could affect the integrity, availability, or confidentiality of data, systems, or services
Resolve security events, incidents, or conduct security assessments using penetration tests, ethical hacking tools, or risk mitigation methodologies to evaluate vulnerabilities
Classify, store, and handle data in accordance with policy or best practices
Troubleshoot, research the root cause of, and resolve security or risk issues with guidance
Diverse Experiences
Amazon Security values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn’t followed a traditional path, or includes alternative experiences, don’t let it stop you from applying.
Work/Life Balance
Inclusive Team Culture
In Amazon Security, it’s in our nature to learn and be curious. Ongoing DEI events and learning experiences inspire us to continue learning and to embrace our uniqueness. Addressing the toughest security challenges requires that we seek out and celebrate a diversity of ideas, perspectives, and voices.
Training and Career growth
We’re continuously raising our performance bar as we strive to become Earth’s Best Employer. That’s why you’ll find endless knowledge-sharing, training, and other career-advancing resources here to help you develop into a better-rounded professional.

BASIC QUALIFICATIONS

- Associate's degree
- Information Security or Cybersecurity
- GCIH (GIAC Certified Incident Handler) or GSEC (GIAC Security Essentials) or Security+


PREFERRED QUALIFICATIONS

- Bachelor’s or Master’s Degree in Information Security/Computer Science or other equivalent quantitative discipline
- Experience with tools such as Wireshark, encryption software, Snort, Sguil, Suricata, Kibana, Metasploit, Nmap, OpenSSL, or Setkey Pursuing certifications (e.g., Certified Ethical Hacker [CEH]) and/or attending events (e.g., Capture the Flag [CTF])
- Ability to deal with ambiguity in a fast-paced environment