This site uses cookies. To find out more, see our Cookies Policy

Security Engineer in Cincinnati, OH at Vaco

Date Posted: 11/5/2018

Job Snapshot

Job Description

Security Engineers, are you looking to move your career forward by taking on new challenges with some of the nation's top companies? Let Vaco serve as your advocate in presenting you to clients who are looking for Security Engineers. Our recruiting staff gives you an advantage over your competition by promoting your strengths and assets directly to hiring managers while helping you to be more prepared for your interviews.

From keeping you up to date on market trends and industry expectations, to providing you with valuable insight into the company's culture, compensation expectations and growth opportunities of specific clients, Vaco will give you the edge you need in today's highly competitive job marketplace. If you have a strong background in IT Information Security and are ready to take that next big career step, let Vaco open the door for you. Apply today!

As an IT Security Engineer, you will Provide support to IT and Information Security teams including functioning as the subject matter expert in IT security systems and custom tools. Serve as technical support for the Incident Response teams in high priority cyber investigations to solve complex problems in a fast efficient manner. Continuously evaluate the external threat landscape, providing leadership regarding replacement or augmentation of existing tool capabilities in order to better secure business systems and data from inside and outside threats. Create and maintain documentation of processes and procedures. Serve as a project leader for security tool selection and implementation projects. Function as lead developer for security tool implementations.

Responsibilities:

• Perform as the technical expert in one or more highly specialized areas of security infrastructure
• Plan, design, deploy, integrate and maintain IT security systems into corporate computing environments including systems used for logging, monitoring, intrusion detection, centralized security knowledge base, and behavioral analysis. Identify, plan, develop and implement automation of routine tasks. Remediate issues occurring with any IT security systems including but not limited to unexplained system outages, security incidents, issues with data collection feeds or interfaces with external MSSP providers. Collaborate with IT teams to remediate any potential hardware or network issues that prevent detection capability
• Plan, design, develop, deploy, integrate and maintain custom security tools that integrate with other IT systems
• Provide "swat team" style support to Incident Response Analysts by resolving problems of the most complex, technical nature. Ensure investigations remain on track with very aggressive schedules
• Drive solution identification, feasibility analysis, and implementation recommendations for operational service level improvements. Drive implementation projects from inception through completion by functioning as the project leader
• Monitor emerging technology trends and the security risks associated with those technologies. Consult with business units to bring awareness of risks and mitigations so business leaders can make risk-informed decisions
• Monitor new developments in the Security software/hardware marketplace. Identify new products with potential benefit and conduct in-depth research and analysis of these products. Demonstrate the applicability of tools in real-world applications using a risk based methodology based on business impact and the threat landscape. Responsible for the evaluation, implementation, and maintenance of purchased hardware/software
• Provide knowledge transfer to team members through meetings, presentations, and written communications and ensure that the centralized knowledge base is up to date. Create, revise and maintain documentation of processes and procedures in the central knowledge base
• Participate in after incident lessons learned meetings to give input on recommendations for additional tools or other mitigations for future incidents

Qualifications:

• Bachelor's Degree in Computer Science, Computer Engineering, IT or a related technical field, or commensurate experience.
• Minimum 5 years of operational support experience with large, enterprise-class applications or services.
• Computer skills and knowledge of hardware & software required:
o Linux-based and MS Windows-based system platforms
o Strong understanding of enterprise, network, system and application level security issues.
o Understanding of enterprise computing environments, distributed applications, and a strong understanding of TCP/IP networks.
o Fundamental or greater understanding of encryption technologies
o Excellent scripting skills. Familiarity with other scripting languages preferred (examples: Perl, Java, or Ruby)
• Knowledge of Identity & Access Management practices, systems and controls.
• Project management experience highly desired.
Experience with security tools including but not limited to IDS/IPS, data analytics software, SIEM solutions (QRadar preferred), WAF, malware analysis, multi-factor authentication systems, knowledge base platforms, and vulnerability scanners/penetration testing tools highly desired
• Security Certifications (i.e. ISC2, GIAC, ISACA, etc.)
• Proven experience in building or engineering security solutions for the following platforms: open systems, windows, Linux and databases
• Proven experience on both Linux-based and MS Windows-based system platforms with a strong IT technical understanding and aptitude for analytical problem-solving. Experience using SSH to maintain and configure systems remotely preferred
• Demonstrated strong understanding of enterprise, network, system and application level security issues preferred
• Proven experience with system hardening processes, tools, guidelines and benchmarks preferred
• Proven understanding of the current vulnerabilities, response, and mitigation strategies used in security preferred

Please apply directly or send resume to Julie Andol at