Security Engineer - Cloud

Company:  Red Sky Consulting
Location: Chicago
Closing Date: 26/10/2024
Salary: £150 - £200 Per Annum
Hours: Full Time
Type: Permanent
Job Requirements / Description

Job Title: Security Engineer - Cloud

Location: Hybrid Onsite in Issaquah, WA or Chicago, IL 3x / Week

Type: Direct Hire

Bottom Line / In a Nutshell:

  • Ideally around 10 years in the industry 5+ years in Security Engineering
  • Security Engineering experience with ecommerce/Retail sites/services hosted in Cloud (Azure/GCP)
  • Experience with Security Tools and Frameworks
  • Bot management (Kasada, DFP, Noknok etc)
  • Experience working with CDN/WAFs like Fastly or Akamai
  • Security issue detection/debugging/mitigation experience, Scripting ability

Summary:

Security Engineers develop, design, implement, and integrate security systems used to safeguard enterprise assets against cyber-attack. Security Engineers drive innovation, influence delivery, and maximize performance. They deliver high quality artifacts, develop and run security tests and continuously tune security tools for optimization. Security Engineers identify gaps and inefficiencies and work with the business to implement solutions based on their requirements.

As part of the Digital Site Security team the Cloud Security Engineer will be focused on improving the security posture and delivery of new and enhanced security capabilities for our BC and BD properties.

Role & Responsibilities:

  • Provides security and technical expertise to support the development of security objects to satisfy business requirements.
  • Analyzes and administers security policies to control physical and virtual system access.
  • Identifies and investigates security issues and develops security solutions that address compliance requirements that can/ do impact security.
  • Identifies, develops, and implements mechanisms to detect security incidents in order to enhance compliance and support of the security standards and procedures.
  • Assesses business role requirements, reviews authorization roles, and supports authorizations
  • Demonstrates a comprehensive skill set with testing authorizations for multiple environments and coordinates testing with business/technical users
  • Validates system configurations to ensure the safety of information systems assets and protects information systems from intentional or inadvertent access or destruction.
  • Implements best practice when applying knowledge of information systems security standards/practices (e.g. Access control and system hardening, system audit and log file monitoring, security policies, and incident handling).
  • Designs and coordinates activities/engagements with other departments (loss prevention, legal, networking, etc.).
  • Identifies security gaps that expose us to potential exploit and develop short- and long-term prioritized remediation to address those gaps.
  • Develops and executes security controls, defenses, and countermeasures to intercept and prevent internal/external data infiltrations.
  • Determines strategy and protocol for network behavior, analysis techniques, and tool implementation.
  • Identifies and resolves problems often anticipating issues before they occur or before they grow; develops and evaluates options; and implements solutions that support the business.
  • Provides subject matter expertise in systems security policies, standards/practices, protocols, and technologies.
  • Configures, deploys, maintains, and supports security tools.
  • Protects confidentiality, integrity, and availability of information from being disclosed to unauthorized parties.
  • Creates dashboards, configures alerts, implements and supports security software platforms, and monitors tools/apps.
  • Identifies opportunities for streamlining, and increasing effectiveness through continuous process improvement.
  • Implements practices, processes, and procedures consistent with our information security policy and IT standards.
  • Develops and documents security events and incident handling procedures into Playbooks.
  • Ensures that incident documentation is comprehensive, accurate, and complete.
  • Triages, prioritizes, investigates, and coordinates security events and incident handling activities.
  • Collaborates with business partners, project teams, and team members to build secure solutions that protects data and enables the business with tools and processes that make sense and adapt to changing business needs both on-premises and in the cloud.
  • Works with internal and external auditors.
  • Designs, configures and maintains various degrees of security.
  • Works with stakeholders and Security Architects to identify security solutions that support their business requirements.
  • Partners with other Information Security groups to conduct security risk assessments on new solutions and systems, periodic security risk assessments on existing systems; and identifies and/or recommends appropriate security mitigations and best practices.

Required Skills:

  • 2+ years’ experience in Security Engineering.
  • Experience in offensive security roles, such as penetration testing or ethical hacking.
  • Experience with Security Engineering of sites hosted in Public Cloud (Google, Azure)
  • Experience working with WAFs and CDNs such as Akamai or Fastly.
  • Proficiency in scripting and programming languages (e.g. Python, JS, Java, SQL) for tool development and automation.
  • Strong understanding of operating systems, network protocols, and web application security.
  • Extensive experience with security tools and frameworks (e.g. Kasada, Microsoft DFP, Bloodhound, Cobalt Strike.).
  • Vast experience in performing code review to identify vulnerabilities.
  • A passion for cybersecurity and a commitment to staying current with emerging threats and industry trends.

Recommended Skills:

  • Bachelor's/Master's degree or equivalent experience in Computer Science, Information Security, or a related field.
  • One or more professional network and security certifications such as Security+, Network+, CCNA, GSEC, CISA or CISSP (or equivalent work experience).
  • Experience performing computer forensics.
  • Familiarity ITILv2/v3 processes such as Service Support, Service Delivery, or Continual Service Improvement.
  • Familiarity with Regulatory Compliance and industry standards, such as HIPAA, SOX, and PCI.
  • Familiarity in a DevOps or DevSecOps environment.
#J-18808-Ljbffr
Apply Now
An error has occurred. This application may no longer respond until reloaded. Reload 🗙