At Balance Staffing, we're obsessed with your success!
SUMMARY
The Workstation Security Engineer I is an individual contributor who will participate in and manage all aspects of information and network security, including intrusion detection, incident response, vulnerability assessment, application security, and compliance with the corporate information security policy for all Client Device endpoints. This person Will primarily be responsible for designing, implementing, administrating, operating, and improving security technologies, including but not limited to Client device endpoints, Azure Microsoft Defender, Al Security tools, Network Access Control, End Point Protection, Two Factor Authentication, and their procedures and processes.
ESSENTIAL FUNCTIONS
Workstations Security Engineering -
- Design, build, test and deploy new security technologies, which include the development of the operational manual and run books
- Provides technical security operations engineering services to support and update existing security systems and works to automate processes related to security implementations, monitoring, and enforcement
- Investigates, recommends, evaluates, deploys and integrates operational security tools and techniques to improve our ability to protect corporate assets and infrastructure
- Participate in technical risk assessments and security exposure analyses of systems, networks and business applications
- Analyzes network security elements and overall network security architectural designs to ensure secure and optimal system and network performance and cost effectiveness
- Responsible for conducting vulnerability assessments and penetration testing, analyzing vulnerability data and prioritizing remediation efforts, and developing vulnerability policies and procedures with the collaboration of GRC.
- Oversees the installation, configuration, and supportive processes of security technologies
- Participate in or lead the Incident Response activities
- Interacts With internal and external clients on security operations requirements, identifies security process and develops strategies / solutions to security issues
- Keeps fully abreast of trends and changing technologies as they relate to IT and Network
- Engineering and Information Security fields
- Lead or assist in periodic or ad-hoc security reports that provide relevant situational awareness to our senior stakeholders
Security Operations / Administration -
Monitor and manage our networks and infrastructure environment for attacks, malicious software, and possible intrusions, which includes the follow-up of complete remediation of infected systemsImplement changes to our security technologies / infrastructure in accordance with standard and change control policies / proceduresEvaluate, implement, tune, and operate security solutions such as IPS, Vulnerability scanning tools, encryption capabilities, etcMonitor and recommend improvements of security technologies and their various reportsRisk Management / Security Audit / Assessment Support / Ad-hoc support -
Support security audit / assessment related activities and compliance reviewsPerforms other tasks, duties and projects as assignedProvide Ad-hoc support as requiredREQUIREMENTS
Bachelor's Degree in Computer Science, Information Systems or related field, or equivalent experienceMinimum 3 years of IT relevant experience or equivalent combination of experience plus at least1 year of experience performing Security Engineering / Planning / OperationsExperience in medium to complex computing environments, with advanced knowledge in security technologies and servicesHands-on experience with at least two or more of the following Enterprise Security Technologies :Network Intrusion Prevention / DetectionVirtual private Networks; SSL, IPSec and Site-to-SiteEnterprise Class Stateful Inspection FirewallsNetwork Access Controls in context to Identity managementWindows server OS & Desktop OSNetwork Packet InspectionDirectory Services including LDAP, AD and Secure Authentication TechnologiesExperience in implementing Information Security technologies and / or processes required.Experience in defining Information Security strategies and frameworksExperience integrating security technologies into corporate operations frameworks.Ability to communicate effectively with client staff at all levels, from technical to executiveMulti-task oriented in a team environmentDemonstrated ability to pay close attention to detailKnowledge of Information security risk assessment methodologies and standardsExperience developing technical documentation, including reports, proposals, statements of work, and whitepapersAbility to work independently, undertaking and completing project tasks on schedule with minimal supervisionBalance Staffing is proud to be an equal-opportunity workplace. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity, Veteran status, or any other characteristic protected by federal or state law.