Endpoint / Cyber Security Engineer Opening - LONG TERM ROLE - Plano, TX

Company: Vinsari
Other Job Openings at the Company: The company has other active jobs (2762)
Your Application: You have not applied yet
Location: Plano, TX, USA
JOB DESCRIPTION
<p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">Job Description</span></span></p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><u><span style="font-family:"Calibri",sans-serif">SUMMARY:</span></u></strong></span></span></p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif">This position is responsible for managing full lifecycle of endpoint security solutions, process, and controls. The role must have demonstrative in-depth knowledge and experience with exploits against and defenses for endpoints. With solid understanding of the tactics, techniques, and procedures (TTPs) used by threat actors against endpoints, this role will serve as the key subject matter expert across all endpoint security projects and interface with the cyber defenders to identify and align controls with emerging tactics and techniques.</span></span></p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"> </span></span></p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><u><span style="font-family:"Calibri",sans-serif">KEY RESPONSIBILITIES:</span></u></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Manage full lifecycle of endpoint security tools such as antivirus software, including implementation, configuration, development, and maintenance.</span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Integrate endpoint security tools into security orchestration and automation platform</span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Develop standard operation procedure and playbook.</span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Integrate endpoint security tools with analytics, monitoring and compliance tools</span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Design and develop back-end management server infrastructure and databases as needed</span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Work with global teams to provide globally consistent processes and solutions.</span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Penetration testing, if required.</span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Experience conducting analysis of electronic media, packet capture, log data in support of enterprise level information security operations.</span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Experience documenting, building, and testing reference architectures</span></span></span></li>
</ul> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"> </span></span></p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><u><span style="font-family:"Calibri",sans-serif">MINIMUM QUALIFICATION:</span></u></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">BA/BS or MA/MS in Engineering, Computer Science, Information Security, or Information Systems required</span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif"><b>3+ years of experience</b> in one or more of the following areas: <b>offensive/defensive hunt techniques, offensive zero-day exploit activities, malware identification methods</b></span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Experience with <b>common attack vectors, including advanced adversaries (nation state/financial motivation)</b></span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Experience <b>securing applications, data
at rest and in transit at the workstation, server and cloud</b></span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Extensive <b>security hands on experiences in engineering security tools configurations, and enhancements from an endpoint device perspective.</b></span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Experience working with cyber security tools and security control, such as <b>Cylance, McAfee, Symantec End Point, TrendMicro Antivirus, Bluecoat, Tanium, CrowdStrike.</b></span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Demonstrated in-depth understanding of operating system (OS) internals, the mechanics of OS exploits, and methods for preventing and/or detecting OS exploits</span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Experience with <b>network-based endpoint security controls, such as web proxies and email security gateways</b></span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Ability to navigate and work effectively across a complex, geographically dispersed organization</span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Excellent communication and written skills</span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Ability to build consensus and cooperation as well as to influence, interact and negotiate with senior leadership in the organization</span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Demonstrable ability to self-direct project outcomes, with minimal supervision to achieve program goals</span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Problem solving and troubleshooting skills to independently resolve communication and systems issues</span></span></span></li>
</ul> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"> </span></span></p> <p><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><strong><u><span style="font-family:"Calibri",sans-serif">PREFFERED QUALIFICATION:</span></u></strong></span></span></p> <ul> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Working experiences within the Access Control strongly preferred</span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Experience with LDAP, Active Directory, IAM, AzureAD, SAML, Azure Identity Management</span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Experience with modern methods of network and endpoint attacks and compromise.</span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Demonstrated knowledge of standard IAM products (i.e. SailPoint, Okta, Forgerock, etc.)</span></span></span></li> <li><span style="font-size:11pt"><span style="tab-stops:list .5in"><span style="font-family:Calibri,sans-serif">Experience with Privileged Account Management (PAM)</span></span></span></li>
</ul>


JOB TYPE
Work Day: Full Time
Employment type: Permanent Job
Salary: Negotiable


JOB REQUIREMENTS
Minimal experience: No experience



Jobs you may be interested in


    Tips You May Be Interested In