Lead Cyber Security Operations Engineer - REMOTE

Request Technology - Anthony Honquest

Lead Cyber Security Operations Engineer - REMOTE
$140-160K +Bonus

*** This position is REMOTE but requires occasional travel to the company headquarters in the Oakland, CA area* **

Prestigious Fortune 500 Firm is seeking a true security engineer who can be their go to Lead Cyber Security Operations Engineer.

Required Basic Qualifications

  • Lead maturity efforts to implement the process and technology roadmap.
  • Deliver a full suite of system life cycle and IT service management activities to support security platforms, including: availability and continuity management, capacity management, customer relationship management supplier relationship management, incident management, problem management, configuration management, change management, reporting, and release and deployment management.
  • Design and implement all changes to technical security solution configurations.
  • Provide security system owners a suite of service management activities focused on the configuration and maintenance of the security functions of the solution, including customer relationship management, supplier relationship management, incident management, problem management, configuration management, change management, release and deployment management, service request management, reporting, and continuous service improvement.
  • Ensure that integrations with or agent deployments of security systems, eg log feeds from Servers or anti-malware agent deployments, continue to exceed established thresholds for environmental saturation and coverage. Provide support and troubleshooting for new integrations or agent deployments.
  • Report to senior leadership on the overall health and effectiveness of security platforms.
  • Establish and maintain expertise in a wide variety of security technologies, including, but not limited to, vulnerability scanning, data loss prevention, intrusion prevention, application Firewalls, web proxies, multi-factor authentication, database security monitoring, sensitive data discovery, and PKI.

Qualifications

BS degree in Computer Science, MIS, Computer Engineering or equivalent work experience.

5 years' experience with a minimum of 2 years in one or more of the following: incident response, application security, network security, security operations, security monitoring, or security focused system's engineering.

Advanced knowledge and understanding of security engineering, system and network security, authentication and security protocols, cryptography, and application security.

Demonstrated experience managing and administering systems security appliances and/or Unix/Linux environments

Experience managing and configuring a WAF product

Strong knowledge of HTTP protocol including analysing Client Server packets and managing web Servers and their related security modules and tools. (Apache, Nginx, ModSecurity, Burp Proxy etc.)

Working knowledge of web-application security concepts

Knowledge of SQL Injection, XSS, RCE, Buffer Overflows, filter invasion, and other application-layer attacks

Demonstrated ability to program or script in languages such as Python, Perl, or Bash

Knowledge and understanding of security engineering, system and network security, authentication and security protocols, cryptography, and application security

Familiar with the concepts of networking and common network defenses to include routing, subnetting, Firewalls, IPS, WAF, etc

Strong familiarity with OWASP Top 10 and ability to assess risk based on established methodologies (ie OWASP Risk Rating Methodology)

Preferred Basic Qualifications

Security related certifications such as OSCP, GIAC, GCIH, GCFA, GCIA, GPEN, GNFA, GCUX, CEH.

Expert level understanding in one core area of Information Security.

Data Science techniques such as clustering, anomaly detection, and machine learning leveraging data analysis tools.

Data analysis skills using SQL, big data technologies, or Scripting.

Experience with IR, SIEM, Threat Intelligence, and Forensics tooling.

Experience leading or driving efficiency in a Vulnerability Management program.

Experience with red teams or CTF (Capture The Flag).

Experience with reverse engineering.

Experience in automation of tasks through Scripting or programming.

Demonstrated technical domain expertise of detection and response technologies and processes.

Demonstrated experience in response activities associated with advanced attacks.

Please email your resume to (see below)

View this job on