Information Security Engineer at Rose International
Memphis, TN 38105
About the Job
Required Education:
Bachelor’s degree in computer science, information assurance, MIS or related field, or equivalent.
Preferred Education:
Preferred (not required): CISSP, CISM and/or SANS certification a plus.
Required Skills:
•Highly technical and analytical expertise, with a proven deep background (preferred 5+ years’ ITS experience in addition to cybersecurity) in technology design, implementation and delivery.
•Experience with purple teaming (red and blue) to train, identify and remediate issues cohesively.
•Experience in cloud computing technologies, including software-, infrastructure and platform-as-a-service, as well as public, private, and hybrid environments.
•Extensive knowledge of traditional security controls and technologies, such as Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), public key infrastructure (PKI), identity and access management (IDAM) systems, antivirus and firewalls, in addition to newer offerings such as endpoint detection and response (EDR), threat intelligence platforms, security automation and orchestration, deception technologies and application controls.
•Skilled in meeting vulnerability and penetration testing requirements.
•Excellence in communicating business risk from cybersecurity issues.
•Experience managing SIEM systems, threat intelligence platforms, security automation and orchestration solutions, IDS/IPS, file integrity monitoring (FIM), data loss prevention (DLP) and other network and system monitoring tools.
•Track record of acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating effectively.
Preferred Skills:
Preferably at least 7+ years’ experience in cybersecurity, including compliance and risk management with a system and network security engineering background.
The Information Security Engineer will be a part of the Enterprise Identity team, focused to mature the program using both Okta (IAM) and SailPoint (governance).
•This position will work within a team of professionals to tackle key initiatives such as automating mover, joiner, leaver activities and streamline the user experience.
Ideal Candidate Profile:
•Seasoned cyber security professional specializing in identity and access management/governance.
Top Skills Required (in order of preference)
•Identity and access management experience specifically in Okta.
•Identity governance experience with SailPoint, Okta, or similar.
•Ability to communicate effectively and work in a team environment.
•Daily workflow assignments this contractor would be responsible for completing or supporting.
•Progress the Information Security department roadmap including Enterprise Identity.
•Engineer quality, fault tolerant solutions that can be used enterprise-wide for enterprise identity and governance.
•Continually expand their knowledge of enterprise identity / governance as well as other Information Security verticals.
•Knowledge transfer to other information security workforce members
•Show up mission driven, with an eye for accomplishing tangible results as assigned.
Years of experience
•Preferably at least 7+ years’ experience in cybersecurity, including compliance and risk management with a system and network security engineering background.
•Highly technical and analytical expertise, with a proven deep background (preferred 5+ years’ ITS experience in addition to cybersecurity) in technology design, implementation, and delivery.
Proficiency in OTKA REQUIRED.
•SailPoint a plus.
Essential Job Functions
•Responsible for implementing, maintaining, monitoring, and managing secure solutions. The engineer delivers these solutions in accordance with the organization’s architectural designs, best practices, and regulatory or compliance requirements. Reporting to the Director Information Security and is expected to contribute to the corporate security strategy with security leadership and other senior security technologists. Recipients of the engineer’s implementations and management include ITS infrastructure, application development, security operations, security audit and end users. With an emphasis on securing systems, applications, third-party connections, service providers and ancillary systems, the Information Security Engineer is responsible for securing business-to-business initiatives, third-party relationships, outsourced solutions and vendors. Considered a highly knowledgeable individual, the Information Security Engineer is expected to implement, monitor and manage secure solutions that address modern day issues.
•Handle day-to-day implementation, monitoring and operational support of hardware, software, customer applications, managed solutions and service provider relationships.
•Actively participate and lead security team meetings that facilitate secure design.
•Engage in information security projects that evaluate existing security infrastructure and propose changes as defined by security leadership and architects. Additionally, deliver projects on time, within budget and in accordance with service level agreements (SLAs).
•Assist with incident response and system stability issues as they occur. This may include involvement outside of regular work hours, and responsiveness is expected.
•Work in tandem with architects, the security operations center (SOC), incident responders (in cases of anomalous activity and host compromise), and technology infrastructure and development team members.
•Respond to and handle service and escalation tickets within SLA expectations.
•Develop security test plans from architectural design. Identify deficiencies and make enhancements to ensure production is not impacted.
•Follow security engineering fundamentals and processes as outlined in standard frameworks
•Influence the planning and execution of incident response and postmortem exercises, with a focus on creating measurable benchmarks to show progress (or deficiencies requiring additional attention).
•Focus on driving security efficiencies, enabling security team members to work on more advanced tasks.
•Conduct performance testing to stress the limitations of security solutions while at the same time ensuring business innovation and day-to-day processes are not negatively impacted.
**Only those lawfully authorized to work in the designated country associated with the position will be considered.**
**Please note that all Position start dates and duration are estimates and may be reduced or lengthened based upon a client’s business needs and requirements.**
Benefits:
For information and details on employment benefits offered with this position, please visit here .Should you have any questions / concerns, please contact our HR Department via our secure website .
California Pay Equity:
For information and details on pay equity laws in California, please visit the State of California Department of Industrial Relations' website here.
Rose International is an Equal Opportunity Employer.All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, sexual orientation, gender(expression or identity), national origin, arrest and conviction records, disability, veteran status or any other characteristic protected by law.Positions located in San Francisco and Los Angeles, California will be administered in accordance with their respective Fair Chance Ordinances.
If you need assistance in completing this application, or during any phase of the application, interview, hiring, or employment process, whether due to a disability or otherwise, please contact our HR Department.
Rose International has an official agreement (ID #132522), effective June 30, 2008, with the U.S. Department of Homeland Security, U.S. Citizenship and Immigration Services, Employment Verification Program (E-Verify). (Posting required by OCGA 13/10-91.).