The Information Security Engineer I is responsible for safeguarding our organization's computer networks and systems, ensuring the confidentiality, integrity, and availability of sensitive data.
Requirements
- Research and deploy advanced security technologies including identity and access management, email hygiene, vulnerability management, SIEM detection rules, or multi-factor authentication
- Design and implement security systems to detect and defend against modern attacks.
- Collaborate with architecture and operations teams to design network and application defenses.
- Develop security product roadmaps for advancing Information Security Program capabilities
- Leveraging cloud and on-premise technologies such as MFA, Entra, and Active Directory, develop solutions for improving authentication security while reducing user impact.
- Evaluate current vulnerability management program and develop improvements in detection and analysis.
- Develop and maintain intrusion detection systems (IDS) and intrusion prevention systems (IPS).
- Scan and monitor networks to identify possible vulnerabilities and intrusions and build tools and strategies to resolve possible causes of security threats.
- Evaluate current network design and configuration standards and recommend architectural changes to reduce risk and increase visibility.
- Develop and maintain intrusion detection systems (IDS) and intrusion prevention systems (IPS).
- Scan and monitor networks to identify possible vulnerabilities and intrusions and build tools and strategies to resolve possible causes of security threats
- Design, implement, and maintain endpoint security tools to control applications, manage firewall data flows, and log aggregation, and malware detection and defenses.
- Maintain detailed documentation of security configurations, incidents, and actions taken.
- Prepare regular reports on security metrics, incidents, and compliance status for management review.
- Perform on-going security reviews and audits to validate, troubleshoot and improve applications' security. Partner with internal and external auditors as well as federal regulators and department management with information security governance and compliance activity investigations.