Join Verinext, a technology company that's not just keeping up with the future, but actively shaping it. At Verinext, we firmly believe that work should be as enjoyable as it is rewarding. As a Senior Security Engineer, you'll be stepping into an environment that thrives on innovation and fun. Our team-oriented culture isn't just a buzzword; it's a cornerstone of our success. We're incredibly proud to have been recognized as a "Best Place to Work" by the Philadelphia Business Journal for 10 consecutive years.
Primary Duties :
- Act as technical hands-on for Cyber Security Projects.
- Support Enterprise Security Technologies.
- Client Management platforms.
- Assess and modify procedures to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access, modification, or destruction.
- Write security reports and make recommendations.
- Prioritize remediation of gaps based on internal and external audits.
- Work with stakeholders to provide security solutions that support their business requirements
- Identify, develop, and implement mechanisms to detect security incidents in order to enhance compliance with and support of security standards and procedures in place.
- Conduct security risk assessments on new products and systems, periodic security risk assessments on existing systems and identify and / or recommend appropriate security countermeasures and best practices.
- Respond to discovered security incidents by informing appropriate custodians, determining root cause, and identifying and executing remedial actions (if necessary) required to re-establish respective information system security.
- Assist management in setting up strategic planning of information security, compliance and internal audit policies and procedures to ensure compliance with the security and privacy regulations and state and federal laws protecting customer and employee confidentiality and privacy.
- Maintain awareness of changes in security risks, security measures, and computer systems assessing new requirements for current and emerging compliance regulations.
Requirements
Requirements : Must have
In lieu of a degree, 10 or more years of relevant experience may suffice. Bachelor's degree in Computer Science preferred.Minimum of 10 years of information systems security or related auditing experience.Preferred certifications : CCNA, CCNP, CISSP, CEH, CISA or equivalent.Hands-on experience with client management tools like SCCM, Intune, Altiris or BMC Client Management, with full lifecycle experience in endpoints and servers.Ability to clearly communicate Information Security matters to executives, auditors, end users, and engineers, using appropriate language, examples, and tone.Strong analytical, technical, and problem-solving skills.Ability to work effectively, independent of assistance or supervision.Self-starter, Innovative, creative, and extremely responsive, with a strong sense of urgency.Willing to share knowledge and assist others in understanding technical and business topics.Willingness to work outside of regular business hours as required, which can include evenings, weekends, and holidays.Experience with a variety of security products including, but not limited to, endpoint security, network security, MFA, and DMZ silos.Working knowledge of information systems security standards and practices (e.g., access control and system hardening, system audit and log file monitoring, security policies, and incident handling).Experience with TACACS+, IDS, IPS and various SIEMS.Working knowledge of protocols and technologies such as Secure DNS, TCP, NTP, UDP, SSL, TLS, SFTP, SMTP, and DHCP.At least one technical certification related to a major platform.Ability to quickly understand security systems in order to identify and validate security requirements.Recommended skills and capabilities
Experience with performing vulnerability scans and assessments as well as computer forensics.Information Security best practices and common processes.A solid understanding of various firewalls, with actual experience in design, installation, configuration, and operation.Knowledge of network protocols, data flows, and vulnerabilities within a TCP / IP environmentAbility to perform network protocol analysis and raw data capture.A solid understanding and knowledge of LDAP.Knowledge of NIST, OWASP , ISO 27001 / 2, PCI-DSS.Self-motivated, self-directed and shows attention to detail while working.Works ethically and with integrity supporting organizational goals and values.Displays commitment to excellence.Completes work in a timely manner and meets deadlines.Contributes to building a positive team spirit and treats others with respect.Maintains confidentiality of information and uses information appropriately.Exhibits sound judgment when making decisions and recommendations.Fosters collaboration toward a common vision and shared goals.