Share this Job

Go Back

IT Security Engineer - Naperville, IL/Rockville, MD/New York, NY


Job Type: Full Time only
Budget $: 100,000 - 200,000

OB SUMMARY:
This position supports the Information Security Group in ensuring that the corporate network, as well as (external) services is secure from external (cyber) attacks and leakage of information to the outside world. This is a highly specialized technical position with hands on support of the security operations function of the Network and system infrastructure. This position will carry out technical operational processes surrounding vulnerability assessment/management, event monitoring/correlation, intrusion detection and prevention, investigations, security awareness, incident response, and Cyber security.
JOB RESPONSIBILITIES:
1.Design, implement and maintain technical security programs including Vulnerability and Threat Management, Data Loss Prevention, Security Event Monitoring and Response.
2.Ensure security of the IT infrastructure, conduct periodic reviews of user IDs, protect the confidentiality and integrity of information, maintain the technical mechanisms and corresponding legitimate access, and comply with all relevant internal control processes as well as IT Security and Privacy Laws and Regulations.
3.Using third party tools, participate in the performance of internal and external penetration testing to identify and address information system security vulnerability.
4.Serve as a cyber-security subject matter expert to support cyber-risk analysis programs by performing, analyzing, and documenting cyber-security surveys and risk-assessments.
5.Participate in developing and maintaining relationships with various business functions including internal audit and third party auditors. Participate in Information Security Group initiated audits and reviews of assigned business processes to evaluate adequacy of controls within IT.
6.Lead the monitoring of the infrastructure security and ensure secure user access. Also lead support, security and troubleshooting for:
a.Corporate event logging appliances and software.
b.Access security badge keycard systems.
c.Closed circuit cameras and digital video recorders.
d.Cisco IDS sensors and firewall.
8.Lead the development and maintenance of IT Policies and Procedures with the various process owners, and publish the latest versions on our intranet web site.
9.Identify, collaborate, coordinate and communicate opportunities for strengthening IT security throughout the company. Organize and coordinate IT Patch Management process in all platforms.
10.Ensure compliance with HIPAA regulations and requirements.
11.Demonstrate Company�¢??s Core Competencies and values held within.
12.The position responsibilities outlined above are in no way to be construed as all encompassing. Other duties, responsibilities, and qualifications may be required and/or assigned as necessary.

JOB SCOPE:
The incumbent works under minimal supervision and exercises discretion when making decisions related to job responsibilities. The incumbent relies on varied knowledge gained through previous experience with non-standard issues to review, analyze, and draw conclusions. One has authority to act on resolutions of extraordinary issues and provides input to how information is presented to the client and communicates results to Supervisor on a weekly basis. The impact on day-to-day operations focuses on operating decisions at the major project or functional level. Work will be subject to occasional review by Supervisor. The incumbent fields questions from a variety of sources both within and outside the Company.
Qualifications: JOB REQUIREMENTS:
�¢?�¢Minimum Bachelor�¢??s degree in Computer Science, MIS, or related field
�¢?�¢Minimum of 8 years of global network security management experience and 8 years�¢?? experience in: Cisco Routing and switching, Network protocols and topologies; network security and overall system integration. Cross-platform technology experience is a plus.
�¢?�¢CISSP or CISA certification is required.
�¢?�¢Network certification is desirable.
�¢?�¢Required licensures, professional certifications, and/or Board certifications as applicable.
�¢?�¢Working knowledge of IBM QRadar SIEM, IDS/IPS, Active Directory security, Oracle and SQL Database security, MS Windows and Unix/Linux Operating System security are required.
�¢?�¢Knowledge, understanding and demonstrated expertise, in the following areas:
oNetwork Security Architecture, Firewalls, Routers and design techniques.
oFunctional security analysis at the enterprise level.
oDevelop, compile and present technical network and infrastructure security documents.
�¢?�¢Working knowledge of VLAN design, Firewall / DMZ design and Configuration is required.
�¢?�¢Working knowledge of the security surrounding Internet Protocol addresses and how to prevent their vulnerability is required.
�¢?�¢Working knowledge of Rapid 7 �¢?? NexPose vulnerability scanning tool and MetaSploit penetration testing tool is required.
�¢?�¢Knowledge of: UNIX/Linux hardening; IPtables firewall; Host based intrusion detection; 2-factor authentication; ACLs; Selinux; Perl/ksh/python scripting; Methods of securing data transmission: openssl, stunnel, https, ssh, etc.; Centralized syslog server implementation and maintenance; Configuration management tools (puppet/chef/cfengine).
�¢?�¢Communication (written, verbal and listening), technical, project management, problem solving, organizational, goal setting, mentoring, leadership and time management skills.
�¢?�¢Ability to create and maintain the IBM XGS IPS security policy for the data center sites and remote offices preferred.
�¢?�¢Ability to determine what IBM Site Protector alerts are critical to block and the application impact when blocked. Know how to interpret the alerts that are generated by the XGS appliances preferred.
�¢?�¢Ability to establish a strategy to migration from IBM XGS IDS simulation mode to real-time intrusion prevention mode as needed to avoid potential outage preferred.
�¢?�¢Ability to integrate IBM IPS with QRadar and show that the alerts have some intelligence, and document the 3rd party Security Operation Center (SOC) requirements for alerts and blocks preferred.
�¢?�¢Ability to monitor the results of SOC and seek opportunities for improvements preferred.
�¢?�¢Ability to create an IDS and IPS policy preferred.
�¢?�¢Ability to work with people and have ability to do presentation to midsize and large audiences.
�¢?�¢Ability to use software, hardware, and peripherals related to job responsibilities, including MS Office.
�¢?�¢Ability to maximize the use of the available technology, welcomes new technology, and stay abreast of the latest technologies.
�¢?�¢Ability to interact with tact, persuasiveness, minimum deviation from standard routings or the making of incidental adjustments to facilitate delivery of services or work output.
�¢?�¢Ability to travel as needed to Company locations and third party locations

Key Skills: