Security Engineer
New York, NY, United States
We are seeking a talented and motivated Security Engineer to join the security team. The Security Engineer will play a key role in ensuring the security and integrity of our systems, networks, and data. The Security Engineer is responsible for monitoring and analyzing information security vulnerability and risk profile using data and alerts generated from various systems; evaluating and remediating impact to the Firm resulting from the unauthorized access, use, modification, destruction, disclosure of Firm and / or client data, documents, work products, or formal records or information technology environment; and implementing and maintaining information security systems in the Firm's global information technology environment. The Security Engineer also assists in evaluating, selecting, and implementing new security technologies -and establishing processes and best practices. The ideal candidate will have a strong background in security architecture, vulnerability assessment, and incident response.
Responsibilities:
- Performing continuous monitoring of the Firm's information security systems, technologies, processes, and procedures, analyzing the findings, and communicating exceptions, concerns and remedial steps to the Director of Security Engineering, and/or Chief Information Security Officer as necessary;
- Cloud security design, implementation, and security control management with regular security assessments, monitoring and audits of cloud infrastructure.
- Promptly reporting any and all exceptions to policies, procedures, and operational standards to the Director of Security Engineering, and/or Chief Information Security Officer as necessary;
- Executing the Firm's information security threat management process, ensuring all aspects of an event are documented and remediated, and communicated to the Director of Security Engineering, and/or Chief Information Security Officer as necessary;
- Developing and sustaining an operationally efficient Vulnerability Management Process.
- Providing customized reports with actionable information to assist with the resolution and completion of activities related to asset vulnerabilities, articulate the current state of vulnerabilities within the enterprise or provide detailed trending of current and historical data designed to highlight changes in security posture and work accomplished.
- Assist in monitoring and analyzing security relevant logs, events, and alerts including, but not limited to, logs from systems, applications, SIEM, AV, Firewalls, file systems, and IPS; document relevant incidents and suggest/co-ordinate appropriate remedial actions.
- Reviewing all operational, hardware, and software changes that may impact the firm's standard information security posture.
- Participating in projects, programs, and initiative to ensure implementation of and adherence to the Firm's information security technology policies, procedures, processes, and technologies.
- Coordinating upgrades, administration and troubleshooting support for all information security products in the Firm's information processing environment, submit and monitor product support requests, coordinate troubleshooting efforts, and drive the Firm's standard issue resolution process to conclusion.
- Providing consultative direction and advice regarding to information security architectural standards, technologies, policies, and procedures for all Firm offices and facilities.
- Exhibiting the ability to think and act strategically as well as tactically, utilizing and developing interpersonal and written and verbal communication skills to effectively support the Firm's global information security functions.
- Demonstrate calm, logical, analytical decision-making abilities and possess good interpersonal and communication skills.
- Must work well under pressure and be able to coordinate project work with others inside and outside the department. Able to respond to and remediate information security events that arise unpredictably and have a good overall understanding of the required work to maintain a highly secure environment
- Substantial knowledge of and experience in two or more of the core security domains including, but not limited to, the following: Endpoint protection, Incident response, IAM, Security Operations, Application and Data security, Infrastructure, Virtualization, Mobile Security, and cloud monitoring.
- Substantial experience in designing and deploying information technology and solutions in one or more of the core domains:
• Endpoint protection
• Incident Response
• Malware Analysis
• Application and Data security
• Infrastructure and Endpoint
• Security Intelligence / SIEM
Education and Experience:
- At least 5 to 7 years' experience in one or more security domain, proven track record of implementing and operating information security systems and working in projects related to the core domains applicable to information security architecture.
- Bachelor's degree in engineering or computer Science a plus.
- 8-10 years of progressive relevant hands-on IT experience