What are the responsibilities and job description for the Information Security Engineer position at SourcePro Search?
SourcePro Search has a fantastic, direct hire opportunity for an experienced Information Security Engineer with our large and top ranked global law firm client.
This role offers a high base and bonus as well as excellent benefits and professional growth potential.
The successful candidate will have a degree in Information Security or a related field and at least 3 years of experience in a professional services environment.
Responsibilities:
Design, implement, administer, troubleshoot, and support security infrastructure on the network, including the following:
Examples of technologies to be addressed include the following:
Work with vendors as necessary to supplement our security capabilities and recommend their use when appropriate.
This role offers a high base and bonus as well as excellent benefits and professional growth potential.
The successful candidate will have a degree in Information Security or a related field and at least 3 years of experience in a professional services environment.
Responsibilities:
Design, implement, administer, troubleshoot, and support security infrastructure on the network, including the following:
- Multicontext firewalls and clustering
- Intrusion detection and prevention
- Vulnerability management
- Centralized log management
- Data Loss Prevention
- Content Filtering
- VMWare and Microsoft Windows systems
- Non-Windows authentication controls, i.e., cloud-based identity management, Cisco, and Palo Alto Networks
Examples of technologies to be addressed include the following:
- Active Directory
- Group Policy
- Windows desktop systems and “locked down” desktop management
- VMWare and Microsoft Windows Server systems
- Non-Windows authentication controls, i.e., cloud-based identity management, Cisco, and Palo Alto Networks
- Two-factor authentication
- Network access control
- Lead efforts to document security standards and procedures, demonstrating best practices to auditors or reviewers.
- Review business processes, recommend and implement supportable security changes, including any relevant tools to better secure those processes.
- Evaluate, implement, and enforce security practices around mobile and remote solutions, including Citrix, VPN, and MDM.
- Maintain and coordinate incident response planning, assisting in execution of the incident response plan as needed.
- Investigate actual and suspected security breaches.
- Ensure consistent policies are applied to any hosted or cloud-based services being utilized by the firm.
- Conduct log review and reporting on security devices and identified Windows systems.
- Generate evidence for compliance/audit.
Work with vendors as necessary to supplement our security capabilities and recommend their use when appropriate.