Sorry, this job is no longer accepting applications. See below for more jobs that match what you’re looking for!

Information Security Engineer

Expired Job

Cybercoders Herndon , VA 20170

Posted 4 months ago

Minimum Required Skills:
IT Security Architecture, Firewalls, Intrusion Detection, Virtual Private Networking, IP Network, ArcSight, Red Hat Linux

If you are a Information Security Engineer with experience in IT Security Architecture and Networking, please read on!

What You Need for this Position

More Than 5 Years of experience and knowledge of:

  • IT Security Architecture & Design (i.e: Firewalls, Intrusion Detection, VPN, LAN/WAN)

  • IP Routing, MPLS, IPsec

  • Hands-on experience with ArcSight, Splunk, QRadar or equivalent tools

  • Red Hat Linux

  • SIEM experience

What's In It for You

  • Vacation/PTO

  • Medical

  • Dental

  • VisionIf you are a Information Security Engineer with experience in IT Security Architecture and Networking, apply today!

Applicants must be authorized to work in the U.S.Please apply directly to by clicking 'Click Here to Apply' with your Word resume!

Looking forward to receiving your resume and going over the position in more detail with you.

  • Not a fit for this position? Click the link at the bottom of this email to search all of our open positions.

Looking forward to receiving your resume!

CyberCoders

CyberCoders, Inc is proud to be an Equal Opportunity Employer

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected by law.

Your Right to Work

  • In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.

Copyright 1999 - 2018 . CyberCoders, Inc. All rights reserved.

Skills:
IT Security Architecture, Firewalls, Intrusion Detection, Virtual Private Networking, IP Network, ArcSight, Red Hat Linux

  • IT Security Architecture, Firewalls, Intrusion Detection, Virtual Private Networking, IP Network, ArcSight, Red Hat Linux
    Permanent
    Full-time, Employee
upload resume icon
See if you are a match!

See how well your resume matches up to this job - upload your resume now.

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Information Security Engineer

Orock Technologies

Posted 5 days ago

VIEW JOBS 1/11/2019 12:00:00 AM 2019-04-11T00:00 <div> <div paraeid="{2de3b55a-70cf-4e0c-a85a-5b0c7272a4ce}{112}" paraid="685639692"><strong>About ORock Technologies  </strong><br /> ORock Technologies is a small business Cloud and Infrastructure as a Service (IaaS) provider that supports the specialized needs of organizations with the highest data security requirements, including Independent Software Vendors (ISVs), solution providers, and enterprise end users in such markets as Defense, Intelligence, Government, Financial Services, and Healthcare. </div> <div paraeid="{2de3b55a-70cf-4e0c-a85a-5b0c7272a4ce}{120}" paraid="1759999909">As a Red Hat Certified Cloud & Service Provider (CCSP), ORock owns and operates a carrier-grade private fiber optic network with multiple data centers and a secure, open source, “pure-play” Red Hat cloud. Our state-of-the-art IaaS and Cloud solutions offer superior levels of security, performance, compliance, flexibility, and control for ORock customers, channel partners, and software vendors. </div> <div paraeid="{2de3b55a-70cf-4e0c-a85a-5b0c7272a4ce}{126}" paraid="317051681"><br /> <strong>Currently we have a need for an Information System Security Engineer to work out of our Reston, VA HQ. YOU MUST BE A US CITIZEN and be eligible for a clearance of Secret level or above. </strong></div> <div paraeid="{2de3b55a-70cf-4e0c-a85a-5b0c7272a4ce}{142}" paraid="299202155"><br /> The Information System Security Engineer opening is a full-time position with responsibilities for development and management of information security operations and maintenance activities; assists in design/implementation of emergency/incident response processes, oversight of log monitoring processes and analysis, and vulnerability scanning. The engineer is responsible for developing security control implementation plans and coordinating the development of advanced security signature or access control mechanisms that can be implemented on security systems such as intrusion prevention/detection systems, firewalls, routers or endpoint in response to new or observed threats within the enterprise.  The engineer will review and approve firewall policy rules and perform signature and policy updates. The engineer will assist in Information Management, as well as other audits, surveys and assessments and maintain security-related procedures applied to new and ongoing projects, applications and network services. </div> <div paraeid="{2de3b55a-70cf-4e0c-a85a-5b0c7272a4ce}{204}" paraid="1979672613"><br /> <strong>Primary Duties and Responsibilities: </strong></div> <ul role="list"> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="1" data-font="Symbol" data-leveltext="" data-listid="13" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{2de3b55a-70cf-4e0c-a85a-5b0c7272a4ce}{210}" paraid="987822763">Performs day to day configuration and operation of security products in production and test networks from Firewalls to end point security applications </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="2" data-font="Symbol" data-leveltext="" data-listid="13" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{2de3b55a-70cf-4e0c-a85a-5b0c7272a4ce}{221}" paraid="1650775710">Leads the identification of advanced security systems and controls to ensure the monitoring and configuring of security appliances </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="3" data-font="Symbol" data-leveltext="" data-listid="13" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{2de3b55a-70cf-4e0c-a85a-5b0c7272a4ce}{228}" paraid="973019059">Analyzes information security problems based on knowledge of the major information security products and services </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="4" data-font="Symbol" data-leveltext="" data-listid="13" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{2de3b55a-70cf-4e0c-a85a-5b0c7272a4ce}{235}" paraid="1823905277">Conduct Security Testing and Evaluation support for applications, systems, and networks in accordance with NIST guidance </div> </li> </ul> <ul role="list"> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="1" data-font="Symbol" data-leveltext="" data-listid="13" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{2de3b55a-70cf-4e0c-a85a-5b0c7272a4ce}{242}" paraid="1581585131">Perform implementation of security and compliance-based use cases based on the NIST 800-53 Rev4 security controls </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="2" data-font="Symbol" data-leveltext="" data-listid="13" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{2de3b55a-70cf-4e0c-a85a-5b0c7272a4ce}{249}" paraid="1987328045">Enable the Nessus product to effectively scan the network for vulnerabilities </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="3" data-font="Symbol" data-leveltext="" data-listid="13" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{1}" paraid="360811539">Support the development and maintenance of Security Operations Center dashboards </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="4" data-font="Symbol" data-leveltext="" data-listid="13" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{20}" paraid="489210178">Support incident handling and response, triage of events, network analysis and threat detection, trend analysis, metric development, vulnerability information dissemination </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="5" data-font="Symbol" data-leveltext="" data-listid="13" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{27}" paraid="292765058">Assist in the investigation and reporting of security incidents </div> </li> </ul> <ul role="list"> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="1" data-font="Symbol" data-leveltext="" data-listid="13" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{34}" paraid="1036112222">Leads or assists with security project implementation including DLP, SIEM, Vulnerability Scanning Solution </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="2" data-font="Symbol" data-leveltext="" data-listid="13" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{43}" paraid="1841140956">Support incident tracking, POA&M management, and ticket resolution </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="3" data-font="Symbol" data-leveltext="" data-listid="13" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{54}" paraid="1963289495">Assist with security strategic planning and architecture roadmap </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="4" data-font="Symbol" data-leveltext="" data-listid="13" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{61}" paraid="1566365130">Assist in developing risk assessment strategy and implementation </div> </li> </ul> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{68}" paraid="1996013175"><strong>Those successful in this position will have: </strong></div> <ul role="list"> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="1" data-font="Symbol" data-leveltext="" data-listid="16" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{74}" paraid="1865088896">Hands on experience configuring Palo Alto Firewalls </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="2" data-font="Symbol" data-leveltext="" data-listid="16" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{82}" paraid="1297752643">Hands-on experience with and knowledge of IT security architecture and design (e.g., firewalls, intrusion detection systems, virtual private networking, virus protection technologies, LAN/WAN design, and/or general internetworking technologies). </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="3" data-font="Symbol" data-leveltext="" data-listid="16" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{89}" paraid="367086354">Full understanding of IP network and security engineering experience including a understanding of IP routing, quality of service mechanisms, MPLS, and IPsec architectures. </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="4" data-font="Symbol" data-leveltext="" data-listid="16" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{96}" paraid="2131338787">Hands on experience configuring, deploying, and managing mission critical network appliances such as routers, firewalls, IDS/IPS, DPI, etc. </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="5" data-font="Symbol" data-leveltext="" data-listid="16" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{103}" paraid="1134662707">Proven hands on experience working with ArcSight, Splunk, QRadar, or equivalent toolsets  </div> </li> </ul> <ul role="list"> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="1" data-font="Symbol" data-leveltext="" data-listid="16" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{110}" paraid="1514759273">Proven hands on experience with Red Hat LINUX </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="2" data-font="Symbol" data-leveltext="" data-listid="16" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{121}" paraid="1442906070">SIEM experience from the perspective of creating searches and understanding how to pivot in the data fields to follow an investigation </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="3" data-font="Symbol" data-leveltext="" data-listid="16" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{128}" paraid="1498890943">Knowledge of Cyber intrusion vectors, malware, networking, and monitoring </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="4" data-font="Symbol" data-leveltext="" data-listid="16" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{135}" paraid="2124900306">Knowledge of threat and vulnerability analysis, routing protocols, routing, intrusion detection systems, intrusion protection systems, Domain Name Service, or network traffic analysis. </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="5" data-font="Symbol" data-leveltext="" data-listid="16" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{142}" paraid="688807822">Leverages knowledge of computer and network architecture to provide analysis during investigations identifying adversarial activity and methods for future detection and prevention </div> </li> </ul> <ul role="list"> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="1" data-font="Symbol" data-leveltext="" data-listid="16" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{149}" paraid="661946908">Knowledge of host and network log sources to apply to investigation, IR methodology in investigations, and the groups behind targeted attacks and tactics, techniques, and procedures (TTPs) </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="2" data-font="Symbol" data-leveltext="" data-listid="16" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{156}" paraid="1695881174">BA or BS in Information Security, Information Assurance, Computer Science, Engineering or related field </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="3" data-font="Symbol" data-leveltext="" data-listid="16" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{169}" paraid="1038128077">Ability to write concise analytical products and assessments </div> </li> <li aria-setsize="-1" data-aria-level="1" data-aria-posinset="4" data-font="Symbol" data-leveltext="" data-listid="16" role="listitem" style="padding: 0; margin: 0;" style="padding: 0; margin: 0;"> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{176}" paraid="1320834533">Strong written and verbal communication skills including the ability to explain technical matters to a non-technical audience </div> </li> </ul> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{183}" paraid="1804794114"> </div> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{187}" paraid="6800450"><strong>Employment Eligibility </strong><br /> <em>ORock Technologies requires the candidate to prove eligibility to work in the United States. All final candidates will be asked to complete a background check. These record checks can include any or all of the following: education verification, employment verification, drug screening, criminal record check, and/or driving record check. </em></div> <div paraeid="{803e7b6a-cff3-48f5-af54-c17d4cbb9b4e}{197}" paraid="1482938951"><br /> <em>ORock Technologies is an equal opportunity employer and considers qualified applicants for employment regardless of race, gender, gender identity, gender expression, age, color, religion, disability, veteran’s status, sexual orientation, or any other protected factor.</em></div> </div> Orock Technologies Reston VA

Information Security Engineer

Expired Job

Cybercoders