Lead Security Engineer
Confidential - new york city, NY
Apply NowJob Description
Salary: $150,000-$190,000 base plus bonusOnsite when needed but might change to up to 5 days onsiteThe Information Security Analyst will be responsible for monitoring Firm security systems and assisting in the coordination effort to remediate alerts and respond to incidents. Key responsibilities entail daily monitoring activities including SIEM and other security tools and identification and mitigation of suspicious events, vulnerability management and threat mitigation. The successful candidate will also support all other Security Operations activities and assist in the deployment and operation of information security systems, as well as work on a diverse set of security-related projects and responsibilities.Essential Duties and Responsibilities:Perform real-time security log and event analysis and take action to contain and mitigate information security threats. The events will originate from SIEM, DLP, IDS, IPS, antivirus, firewalls, system security logs and user reports.Create, analyze and develop remediation plans resulting from the identification of vulnerabilities discovered during scheduled scans.Assist in maintaining existing security systems such as IPSIDS, Anti-Virus, EPO, SIEM, NAC and other cyber-attack detection and analytics tools; assist with security technologies deployment, configuration, maintenance, patchingupgrading and decommission.Assist with troubleshooting technical issues and identifying root cause and solutions.Monitor information systems and services to audit and maintain security controls to ensure compliance with Firm policies and industry best practices.Make enhancements to existing monitoring and security operations and contribute to a Continuous Monitoring program framework.Work across teams to accomplish security program goals.Assist with GRC work when needed.Knowledge, Skills, and Abilities Required:Strong knowledge of information security domains, concepts and principals.Strong knowledge of network services, vulnerabilities, exploits and attacks.Strong ability to troubleshoot technical issues, identify root cause and identify solutions.Knowledge of SPLUNK considered a cident Response experience:TIER 23 CSIRT Analyst.Knowledge of server and desktop operating systems, routers, switches, firewalls and other network equipment.Familiarity with MITRE ATT&CK framework.Experience with any of the following considered a plus:Vulnerability Scanning toolsNetwork ScanningManagement toolsEvent Log management systemsAnti-virus, Anti-spam and other protective toolsEncryption products and Open source security-related toolsForensic ToolsEDR, NDR, XDR toolsConducting adversary simulation based on intrusion frameworksCritical thinking, investigative mindset and ability to conduct root cause analysis.Detail oriented and able to meet tight deadlines.Excellent written, verbal and interpersonal skills.Highly motivated self-starter with an inquisitive personality.Desire and ability to learn new skills and concepts.
Created: 2024-10-19