ECFMG
  • Information Technology
  • Philadelphia, PA, USA
  • Full Time

ECFMG offers competitive compensation and excellent benefits including generous coverage for health, dental and vision insurance, 15% employer contribution to retirement, 100% tuition reimbursement, and many other great benefits. ECFMG is an equal opportunity employer.


ECFMG is seeking a Senior Security Engineer in the Philadelphia, PA office.

The Senior Information Security Engineer operates and maintains the Security teams portfolio of vulnerability management, Security Incident and Event Management (SIEM), automation, and authentication tools. Additional tasks include forensic recovery/support, event management, spam investigation, threat feed management, penetration tests findings mitigation, proactive defense, network sensor auditing, and security event management. This role will focus heavily on operational and strategic level tasks, and provide counsel and guidance to the junior level analysts in the department. The Senior Security Operations Engineer also serves in an architectural capacity, providing the appropriate information and planning required for new technology and policy deployments.

The ideal candidate is hands-on, articulate and focused, and can own projects, features and functionality; enjoys learning and mentoring others. Our core tools AlienVault, SCCM, and Windows Defender ATP, but you don't have to be an expert in any of these; we're looking for a world-class Security operations engineer to help create a world class security operations environment.

SKILLS

  • Understanding of DNS, firewalls, proxies, SIEM, antivirus, and IDS/IPS
  • Operational Experience in network security, firewalls, intrusion prevention systems, Web Application Firewalls, vulnerability scanning tools (Qualys, Nessus, etc.), SIEM tools (eg. AlienVault, Splunk), DLP, encryption, etc.
  • Experience in network administration and security
  • Experience in UNIX/Linux operating systems administration
  • Understanding of database administration and security issues related to relational databases (MySQL or Postgres)
  • Experience with Salesforce cloud security and best practices
  • Understanding in data privacy and data security-related regulatory requirements, such as HIPAA, GDPR, and related security and quality framework and standards (such as ISO 2700x, NIST800, HITRUST, SOC II, etc.)
  • Experience with public cloud PaaS platform, such as AWS, GCP or Azure.
  • Experience with remediation of vulnerabilities and patches
  • Experience working with identity and access control management solutions
  • Familiarity with infrastructure best practices
  • Familiarity with secure coding practices and secure SDLC
  • Familiarity with Python, Java, Perl, PowerShell (or another Object-Oriented Programming language

DUTIES

  • Lead the team on developing, refining, and executing overarching Information Security strategy to continue to improve overall security in the organization and that aligns with the organization's risk appetite.
  • Lead efforts on documenting and updating program processes and workflow as needed to align with changing IT environment, Information Security best practices to support the business.
  • Lead an effort to develop mechanism to present metrics from various security controls and technologies.
  • Provide ongoing evaluation of business process and technical controls.
  • Lead and participate in project prioritization meetings.
  • Work with solution designers, product owners, developers, project managers, business analysts and others, in identifying security requirements for projects and ensures that these requirements are met as part of the software development lifecycle.
  • Works alongside and guide team members to effectively analyze, assess and document the security risk of any new technologies and/or ideas to the Enterprise. Provide recommendations on compensating controls to mitigate security risks and allow solution to be implemented securely.
  • Lead efforts in working with vendors, implementation partners, and contractors on activities tied to Information Security.
  • Ensure that personal and team tasks are completed on time and within budget and that milestones are successfully reached.
  • Take the lead in security operations, including management, enhancement, and implementation of technical solutions and tools across the Enterprise to help mitigate security vulnerabilities and automate repeatable tasks.
  • Manage, Configure, Patch, Upgrade and troubleshoot the platform information security tools and systems, such as Firewalls, IPS/IDS Systems, Web Application Firewalls, Load Balancers, Encryption, Endpoint Security Systems, etc.
  • Support regular testing for disaster recovery.
  • Proactively identify, troubleshoot, and mitigate vulnerabilities and provide metrics for reporting.
  • Participate in and lead conversations on incident response, including incident identification and containment/remediation.
  • Lead the expansion of defense-in-depth security for the organization to protect critical IT assets and data from internal and external threats.
  • Lead the development, execution, and enforcement of security processes, and procedures
  • Monitor and track known vulnerabilities in our applications and infrastructure.
  • Work with teams to fix the vulnerabilities in their respected areas (e.g., servers, databases, applications, etc.).
  • Leads team effort on special projects and performs other duties as assigned by Senior Manager, IS Business Operations and Information Security.
  • Provide technical and programmatic Information Assurance Services to the Enterprise and customers in support of network and information security systems.
  • Design and develop security requirements within an organization's technology and business processes and assist in implementation of appropriate network, identity and access management, and overall security controls.
  • Research, analyze, design, and implement robust security architectures for any IS initiative.
  • Research, investigate, document, and coordinate, and report out on remediation or mitigation of vulnerabilities and exploits that have an impact or potential impact to ECFMG FAIMER CSEC.
  • Responsible for investigating, classifying, documenting, remediating and reporting on security breaches and incidents that would be considered a risk to the company such as cyber threats, system outages, log failures and/or unusual system behaviors.
  • Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.).
  • Lead and participate in the design and execution of vulnerability assessments, penetration tests, threat hunting, risk analyses, security assessments, and other exploratory risk finding activities.
  • Provide technical expertise for the Information Security team and guidance to the Information Services department.
  • Update and upgrade security systems as needed.
  • Work with Information Services and Information Security team to conduct cyber intelligence analysis to develop an understanding of intent, objectives and activities as well as remediation plans.
  • Ensure project work and products are compliant with security policies, policy and procedure development.
  • The individual is expected to keep up to date with current security technologies, news, trends, and vulnerabilities as they relate to the organization's environment and security landscape.
  • Research security enhancements and make recommendations to management.
  • Provide on-call technical support and serve as an escalation point
  • Must be able to work nights and weekends and variable schedule(s) as assigned
  • Other responsibilities and duties as assigned by IS Management

EXPERIENCE

Minimum 5-7 years of experience in Information Security as an Security Operations Engineer, Security Architect, Information Security Analyst, or similar role.

EDUCATION

Bachelor's Degree in Computer Science, Computer Engineering, or similar. Industry certifications such as CISSP, CISA, CISM, GSEC, etc. are strongly preferred.

 

ECFMG
  • Apply Now

  • * Fields Are Required

    What is your full name?

    How can we contact you?

  • Sign Up For Job Alerts!

  • Share This Page
  • Facebook Twitter LinkedIn Email
.
On-line Services Programs About ECFMG FB Logo News Resources Twitter YouTube Linkedin