What are the responsibilities and job description for the Sr Cybersecurity Engineer position at Jobs via Dice?
Dice is the leading career destination for tech experts at every stage of their careers. Our client, Cloud Bigdata, is seeking the following. Apply via Dice today!
Job Description :
Play a vital role in designing and building a comprehensive threat detection program
Work with partners throughout security and engineering to develop and improve threat detection logic, enhance response capabilities, and deploy new tools
Identify active threats to client system environments including Client.com, corporate networks, third party services, and individual user endpoints Threat Modeling / Hunting
Inform log ingestion requirements for threat detection use case development
Research of new attack techniques in order to improve detection logic.
Creating custom logic, detection rules, and alerts to identify suspicious patterns and activity.
Security Detection Lifecycle Management (Maintain, tune, deprecate, etc.)
Develop content to improve detective capabilities in Security tooling (SIEM, EDR, etc.)
Work with IR teams to respond to security incidents promptly
A champion for process, recommending tool, software development, or infrastructure changes to improve or enhance security
Lead small to medium sized projects as advised (taking ownership while developing/driving a solution to its full value/completion)
Develop and deliver metrics
Participate in Cyber Incident Response Team rotation that may involve non-traditional working hours
Skills
Knowledge of Machine Learning Concepts and Capabilities
Proficiency in multiple Operating Systems (Ex. Linux, Windows, Mac, etc.)
Familiarity with regular expressions and data normalization techniques
Knowledge of Cybersecurity tooling and how it can be used to create insights
Knowledge of detection methods (ATT&CK).
Knowledge of Cloud related technologies (Azure, AWS, Google Cloud Platform, etc.)
Medium to advance knowledge of Scripting tools (Python/Perl/Shell/HTML/PHP)
Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI ()
Familiarity with load balancers (ex A10, F5), firewalls (ex CheckPoint), Venafi, MDM (ex - Mobile Iron), Cloud (ex - AWS, Azure), Malware Protection (ex -FireEye), Advanced Persistent Threats (ex - Damballa), Privileged Accounts (ex CyberArk), SIEM (ex ArcSight), Log & Event (ex Splunk), Intrusion IDS/IPS (ex Symantec) , Cloud Platform (ex PCF, Docker), Scanning (ex Qualys), AppSec (ex - Veracode)
Strong problem solving / fixing skills
Self-motivated and able to work under timelines.
Always act with tact and integrity, and work with a variety of individuals in a positive and productive manner
Strong verbal and communication skills with diverse multi-functional groups & the ability to present effectively to small & large groups
Knowledge of information security policies and regulatory controls (per team function)
Demonstrable knowledge of current technological trends and developments in the area of info security
Ability to plan, organize and prioritize tasks to complete independently; Ability to work under pressure and meet timelines
We are an equal opportunity employer. All aspects of employment including the decision to hire, promote, discipline, or discharge, will be based on merit, competence, performance, and business needs. We do not discriminate on the basis of race, color, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, national origin, citizenship/ immigration status, veteran status, or any other status protected under federal, state, or local law.
Job Description :
Play a vital role in designing and building a comprehensive threat detection program
Work with partners throughout security and engineering to develop and improve threat detection logic, enhance response capabilities, and deploy new tools
Identify active threats to client system environments including Client.com, corporate networks, third party services, and individual user endpoints Threat Modeling / Hunting
Inform log ingestion requirements for threat detection use case development
Research of new attack techniques in order to improve detection logic.
Creating custom logic, detection rules, and alerts to identify suspicious patterns and activity.
Security Detection Lifecycle Management (Maintain, tune, deprecate, etc.)
Develop content to improve detective capabilities in Security tooling (SIEM, EDR, etc.)
Work with IR teams to respond to security incidents promptly
A champion for process, recommending tool, software development, or infrastructure changes to improve or enhance security
Lead small to medium sized projects as advised (taking ownership while developing/driving a solution to its full value/completion)
Develop and deliver metrics
Participate in Cyber Incident Response Team rotation that may involve non-traditional working hours
Skills
Knowledge of Machine Learning Concepts and Capabilities
Proficiency in multiple Operating Systems (Ex. Linux, Windows, Mac, etc.)
Familiarity with regular expressions and data normalization techniques
Knowledge of Cybersecurity tooling and how it can be used to create insights
Knowledge of detection methods (ATT&CK).
Knowledge of Cloud related technologies (Azure, AWS, Google Cloud Platform, etc.)
Medium to advance knowledge of Scripting tools (Python/Perl/Shell/HTML/PHP)
Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI ()
Familiarity with load balancers (ex A10, F5), firewalls (ex CheckPoint), Venafi, MDM (ex - Mobile Iron), Cloud (ex - AWS, Azure), Malware Protection (ex -FireEye), Advanced Persistent Threats (ex - Damballa), Privileged Accounts (ex CyberArk), SIEM (ex ArcSight), Log & Event (ex Splunk), Intrusion IDS/IPS (ex Symantec) , Cloud Platform (ex PCF, Docker), Scanning (ex Qualys), AppSec (ex - Veracode)
Strong problem solving / fixing skills
Self-motivated and able to work under timelines.
Always act with tact and integrity, and work with a variety of individuals in a positive and productive manner
Strong verbal and communication skills with diverse multi-functional groups & the ability to present effectively to small & large groups
Knowledge of information security policies and regulatory controls (per team function)
Demonstrable knowledge of current technological trends and developments in the area of info security
Ability to plan, organize and prioritize tasks to complete independently; Ability to work under pressure and meet timelines
We are an equal opportunity employer. All aspects of employment including the decision to hire, promote, discipline, or discharge, will be based on merit, competence, performance, and business needs. We do not discriminate on the basis of race, color, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, national origin, citizenship/ immigration status, veteran status, or any other status protected under federal, state, or local law.