Information Security Engineer Engineering - Chandler, AZ at Geebo

Information Security Engineer

TITLE:
Information Security EngineerLOCATION:
Chandler, AZ(No relocation assistance offered.
)COMPANY DESCRIPTION:
Our client is a diversified financial services company providing banking, insurance, investments, mortgage, and consumer and commercial finance through more than 9,000 stores and more than 12,000 ATMs and online across the US and internationally.
Our client has $1.
4 trillion in assets and more than 270,000 team members in more than 35 countries across our 80
businesses.
They are ranked 4th in assets and first in market value of our stock among U.
S.
peers.
Among all the financial services companies, our client ranked 1st in market value in the U.
S.
and 4th in the world.
Job Description:
Troubleshooting, diagnosing and resolving complex security attacks upon network using various products, best practices, and other advanced security techniques.
Interfacing with other technical support personnel, engineering and product management to escalate and resolve critical customer issues.
This person develops specifications for extremely complex computer network security/protection technologies for company information and network systems/applications.
This role also develops security solutions for the company's networks and virtual private networks, application systems, key public infrastructures, authentication and directory services to ensure the security of the network and confidential data.
Identifies emergent vulnerabilities, evaluates associated risks and threats, and designs network vulnerability scans to identify security vulnerabilities and provides remediation alternatives to the customer.
This person serves as technical lead responsible for specific areas of computer security incident response activities to include intrusion detection monitoring, scanning, cyber threat reporting, and development/implementation of vulnerability mitigation strategies.
This person will be leading the security risk assessments to ensure compliance with corporate security policies and adherence to best practices, as well as, leading the evaluation of vendor proposals, new and existing security designs, and emerging security technologies and systems.
This person also serves as a high level technical security resource on large-scale network and/or systems/applications issues.
May direct or serve as a mentor to less experienced staff.
Qualifications:
7
years of experience in security applications and systems.
A technical background in security technologies and concepts including defense in principles, firewall data and security event remediation techniquesAdvance understanding of Network Technology, Cyber-attacks, Security Controls and Analysis best practicesDemonstrated ability to analyze security events to quickly determine and isolate malware sources, targets, scope and implement effective containment optionsExperience with Netflow, load balances, routers, firewalls, web applications and server logs performing analysis of large data setsExperience in a critical monitoring and analysis function (security monitoring, network monitoring, etcExperience with incident handlingExperience developing and implementing security or network controlsExperience with encryption SSLMust be able to adapt to a fast paced, ever changing environment demonstrated ability to think outside the boxThis is a Security Monitoring position supporting a 24/7/365 function.
As such, candidates will be required to work one holiday a year.
PREFERRED SKILLS/ABILITIES:
Experience with multiple computing platforms (Windows, Linux, etc.
)Knowledge of DDOS concepts and techniquesAbility to apply forward-thinking in a fast-paced and rapidly evolving environment Recommended Skills Adaptability Authentications Big Data Computing Platforms Corporate Security Cryptography Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.