IS Security Engineer

| Hybrid
Sorry, this job was removed at 6:14 p.m. (PST) on Thursday, August 31, 2017
Find out who's hiring in Greater LA Area.
See all Cybersecurity + IT jobs in Greater LA Area
Apply
By clicking Apply Now you agree to share your profile information with the hiring company.

The IS Security Engineer reports to the IS Security Manager in our DTLA campus. The IS Security Engineer role includes both operational and planning aspects. The operational functions are the day-to-day operations of the in-place security solutions and the identification, investigation and resolution of security events detected by those systems as well as conduct of audits and assessments. The planning functions include involvement in the implementation of security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines and procedures. The IS Security Engineer is expected to be fully aware of the enterprise’s security goals as established by its stated policies, procedures and guidelines and to actively work towards upholding those goals and refining those policies, procedures and guidelines where appropriate.

Responsibilities

Strategy & Planning

  • Participate in the planning and design of enterprise security architecture, under the direction of the IT Security Manager, where appropriate.
  • Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines and procedures) under the direction of the IT Security Manager, where appropriate.
  • Participate in the creation of secure software development documents (policies, standards, baselines, guidelines and procedures) under the direction of the IT Security Manager, where appropriate.
  • Participate in the planning and design of Business Continuity and Disaster Recovery Plans, under the direction of the IT Security Manager, where appropriate.

Acquisition & Deployment

  • Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors.
  • Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.
  • Perform the deployment, integration and initial configuration of security solutions and of enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically.

Operational Management

  • Maintain up-to-date baselines for the secure configuration and operations of in-place devices, whether they be under infosec’s control (i.e., security tools) or under IT/Other control (i.e., workstations, servers, network or lab devices, etc.).
  • Maintain operational configurations of all in-place security solutions as per the established baselines.
  • Monitor all in-place security solutions for efficient and appropriate operations.
  • Review logs and reports of all in-place devices, whether they be under infosec’s control (i.e., security tools) or under IT/Other control (i.e., workstations, servers, network or lab devices, etc.). Interpret the implications of that activity and devise plans for appropriate resolution.
  • Participate in investigations into problematic activity.
  • Participate in the design and execution of vulnerability assessments, penetration tests and security audits.
  • Provide on-call support for in-place security solutions.
Position Requirements

Formal Education & Certification

  • College diploma or university degree in the field of computer science and/or 2 years equivalent work experience.
  • One or more security certifications:
    • Associate of (ISC)2
    • SANS / GIAC Information Security Fundamentals
    • Microsoft Certified Systems Administrator: Security
    • CEH

Knowledge & Experience

  • Experience with Wireshark, IPS/IDS and network scanning tools.
  • Experience with a common SIM solution or Splunk or ElasticStack.
  • Experience with a vulnerability assessment tool – Qualys, Rapid7, Tenable, OpenVAS, Retina, etc..
  • Experience writing or auditing firewall rules in at least one common firewall (Cisco, IPTables, pf, JunOS, etc.)
  • Strong understanding of IP, TCP/IP, trunking, QoS, 802.1x and other network standards and protocols.
  • Strong understanding of software development methodologies, pipelines and application security (Agile, SDLC/Waterfall, OWASP, etc.).
  • Working technical knowledge of wireless networking technologies.
  • Working technical knowledge of computer architecture fundamentals – cpus, interrupts, memory protection, storage architecture, virtualization, etc..
  • Working technical knowledge of cloud technologies and paradigms in AWS, Azure or OpenStack.
  • Experience solving operational problems in at least one scripting language (Python, Ruby, bash, Powershell, VBScript, etc..
  • Strong understanding of discretionary access controls.
  • Working technical knowledge of Windows system internals, processes and features (AD, IIS, etc.).
  • Working technical knowledge of Linux, operating system internals, common services and security configuration, syslog.
  • Working technical knowledge of common protocols, standards and services used in multi-tier applications, including, HTTP, SQL, SMTP, LDAP, REST, JSON, XML.
  • Familiarity with authentication technologies such as RADIUS, SAML, OAUTH, multi-factor technologies, smart cards, OTP, etc..
  • Familiarity with encryption technologies and products such as BitLocker, PGP, FileVault, encfs, etc..
  • Working technical knowledge of SSL/TLS, X.509 certificates, certificate configuration and tools (OpenSSL, Java keytool, etc.).
  • Familiarity with Windows Group Policy and Security Configuration Management.
  • Familiarity with MacOS, Apple technologies.
  • Familiarity with OWASP Top 10
  • Familiarity with CIS Benchmarks and other baselines.
  • Familiarity with CVEs and vulnerability management.

Personal Attributes

  • Proven analytical and problem-solving abilities.
  • Ability to effectively prioritize and execute tasks in a high-pressure environment.
  • Good written, oral, and interpersonal communication skills.
  • Ability to conduct research into security issues and products as required.
  • Ability to present ideas in business-friendly and user-friendly language.
  • Highly self-motivated and directed.
  • Keen attention to detail.
  • Team-oriented and skilled in working within a collaborative environment.
Work Conditions
  • 40-hour on-site work week with on-call availability.
  • Up to 20% travel required.
  • Sitting for extended periods of time.
  • Sufficient dexterity of hands and fingers to efficiently operate a computer keyboard, mouse, and other computer components.
  • Lifting and transporting of moderately heavy objects, such as computers and peripherals.

 

Hyperloop One is an Equal Employment Employer; employment is governed on the basis of merit, competence and qualifications and will not be influenced in any manner by race, color, religion, gender (including pregnancy, childbirth, or related medical conditions), national origin/ethnicity, veteran status, disability status, age, sexual orientation, gender identity, marital status, mental or physical disability or any other protected status. Hyperloop One will consider qualified applicants with criminal histories consistent with the “Ban the Box” legislation.

Read Full Job Description
Apply Now
By clicking Apply Now you agree to share your profile information with the hiring company.

Location

We're located in the Arts District, an up-and-coming neighborhood with trendy restaurants and breweries – just minutes from Downtown LA.

Similar Jobs

Apply Now
By clicking Apply Now you agree to share your profile information with the hiring company.
Learn more about Hyperloop OneFind similar jobs