Information Security Engineer

The Information Security Engineer will be responsible for providing engineering analysis, design, implementation, and support of the organizations information systems controls.

Required Experience:


+ Years
Job Locations:


Location Restrictions:


Basic Qualifications and

The information security engineer's role lies within the Chief Information Security Officer's organizational structure, reporting to the Manager of Information Security Operations.

  • Researches, designs, and implements information security solutions for organization  systems and products that comply with all applicable security policies and  standards
  • Works with IT and internal and external business partners to ensure that security is  factored in the evaluation, selection, installation and configuration process  of hardware and software
  • Analyzes and  makes recommendations to improve network, system, and application  architectures
  • Examines network, server, and application logs to determine trends and identify security  incidents
  • Provide end  to end support for all IT Security service line products and operate as part  of an on-call rotation
  • Assists in  the review and update of information security policies, architectures, and  standards
  • Assists in  responding to audits, penetration tests and vulnerability assessments
  • Function as  part of the Information Security incident response team and perform  investigations related to security incidents.
  • Harden  network infrastructure including VPN, wireless, and endpoint security  solutions

Required Skills and Experience
  • Technical expertise  in network security knowledge, to include VPN, Firewall, network monitoring,  intrusion detection, web server security, and wireless security
  • Security  technologies including encryption, data protection, access privileges
  • Knowledge of  Microsoft Windows and Linux systems
  • Strong  knowledge of common vulnerabilities and exploitation techniques
  • Solid coding  and scripting skills (Python, PowerShell, Java)
  • Practical  experience with database security, content filtering, vulnerability scanning,  and anti-malware
  • Knowledge of  IAM strategy, best practices and design

Interested in this position?
Fill out the form below!