Apply

Security Engineer - Remote

Posted 2024-11-21

View full description

💎 Seniority level: Senior, 5+ years

📍 Location: United States

🔍 Industry: Data and technology

⏳ Experience: 5+ years

🪄 Skills: PythonAgileETLGolangREST APICI/CDLinuxTerraformDocumentation

Requirements:
  • 5+ years experience in security engineering or site reliability engineering.
  • Excellent Terraform skills required.
  • Experience working with and developing CI/CD pipelines for Infrastructure as Code required.
  • Knowledge of programming/scripting fundamentals (python/golang) required.
  • Expertise in performing ETL onboarding for diverse log feed technologies required.
  • Experience supporting a Splunk platform administration, new content dashboards, applications, and use cases.
  • Hands-on experience developing Rest API's to capture data from external sources.
  • Experience with Agile methodologies.
  • Understanding of multiple log formats and source data for SIEM Analysis.
  • Solid background with Windows and Linux platforms (security or system administration).
  • Experience with technical concepts including networking and several cyber attacks.
Responsibilities:
  • Understand data feeds of multiple security tools and logs that feed the SIEM & UEBA technologies.
  • Identify capabilities and quality of these feeds and recommend improvements.
  • Create new content use cases based on threat intelligence, analyst feedback, available log data, and previous incidents.
  • Perform daily activities of the content life cycle including creating, testing, tuning, and maintaining associated documentation.
  • Improve vulnerabilities across different application environments.
  • Work with other security teams and product SMEs to identify capability gaps.
  • Develop parsers and field extractions to support content development.
  • Develop custom scripts to enhance default SIEM functionality.
  • Participate in root cause analysis on security incidents and provide recommendations for new data sources and enrichment.
Apply

Related Jobs

Apply

📍 United States

🧭 Full-Time

💸 100000 - 120000 USD per year

🔍 Technology-enabled healthcare services

🏢 Company: Urrly

  • 3-5 years of hands-on experience in security engineering.
  • Experience deploying and managing IAM, SIEM, firewalls, anti-malware, and vulnerability scanning systems.
  • Strong ability to manage security technologies in AWS and enterprise environments.
  • Familiarity with SOC 2, HITRUST, and HIPAA frameworks.
  • Strong documentation skills for developing policies, procedures, and security configurations.
  • Proven success in identifying, remediating, and preventing security threats.

  • Design, implement, and maintain security measures, tools, and frameworks to protect systems and sensitive data.
  • Install, configure, and manage security controls in AWS environments such as firewalls and intrusion detection systems.
  • Monitor infrastructure for potential threats and conduct incident response.
  • Lead compliance initiatives with frameworks like SOC 2, HITRUST, and HIPAA, including audit support and documentation.
  • Perform risk evaluations, vulnerability assessments, and enhance overall security posture.
  • Collaborate with cross-functional teams to align security policies with business goals.

AWSBashCybersecurityAmazon Web ServicesLinuxDocumentationCompliance

Posted 2024-11-21
Apply
Apply

📍 U.S.

🧭 Full-Time

🔍 Cybersecurity

🏢 Company: GuidePoint Security

  • 6 or more years of IT experience or related field.
  • At least 4 years of experience administering and supporting Azure/Office/M365 technologies.
  • Minimum 2 years of experience with M365 security suite such as Defender for Cloud apps and Conditional Access.
  • Minimum 2 years of experience with Azure capabilities like Defender for Cloud and Sentinel.
  • Microsoft certification such as Microsoft 365 Security Administrator or Azure Security Engineer Associate required within 3 months of hire.

  • Use knowledge of Microsoft Azure, M365, and EM+S products to design and make recommendations on Microsoft Cloud Security.
  • Communicate compliance management for M365 or Azure products and implement best practices for security.
  • Contribute to technical design sessions and prepare documentation for architectural reviews.
  • Manage Microsoft Entra ID and identity life-cycle management.
  • Conduct security assessments using established cloud security standards.
  • Document findings and recommendations for clients and demonstrate strong communication skills.

Cloud ComputingCybersecurityMicrosoft AzureSharePointAzureCommunication SkillsCollaborationDevOpsTerraformDocumentationCompliance

Posted 2024-11-19
Apply
Apply

📍 United States

🧭 Full-Time

🔍 Dating products

  • Technical background in security with experience in writing security-adjacent code.
  • Creative approaches in performing quick and impactful work.

  • Help ensure the highest standard of security for Match Group products.
  • Work spans across applications, infrastructure, devices, vendors, and anything else potentially at risk.

PythonSoftware DevelopmentCybersecurityCommunication SkillsAnalytical SkillsCollaborationProblem SolvingAttention to detailOrganizational skillsTime ManagementWritten communicationDocumentation

Posted 2024-11-13
Apply
Apply

📍 United States

🧭 Full-Time

🔍 Dating products

  • Technical backgrounds with a track record of writing security-adjacent code.
  • Creative approaches in performing quick and impactful work and development techniques.

  • Help ensure the highest standard of security for Match Group products and members.
  • Work encompasses applications, infrastructure, devices, vendors, and any potential risks.

Backend DevelopmentSoftware DevelopmentCybersecurityGitAmazon Web Services

Posted 2024-11-10
Apply
Apply

📍 USA

🔍 Dating products

NOT STATED

  • Ensure the highest standard of security for Match Group products and members.
  • Lead collaborations across various teams.
  • Develop, design, and execute security priorities.
  • Impact all of Match Group's user-facing platforms.

LeadershipCybersecurityCross-functional Team LeadershipCommunication SkillsAnalytical SkillsCollaboration

Posted 2024-11-09
Apply
Apply

📍 United States

🧭 Full-Time

🔍 Dating products

  • At least 3 years of professional experience in application security.
  • Experience securing large-scale web/mobile applications, including performing security code reviews, vulnerability assessments, and manual testing for logic flaws.
  • Familiarity with dynamic and static application security tools.
  • Experience performing thorough threat modeling of web applications.
  • Bachelor’s Degree in Computing Security, Information Security, or related field.

  • Help with the implementation of security automation tools, static/dynamic code analysis, and evaluation of bug bounty reports.
  • Assist in research into suspected application vulnerabilities.
  • Maintain awareness of known vulnerabilities in application technologies used within Match Group.
  • Interface with engineering teams and effectively convey impact and provide remediation guidance for vulnerabilities.

Software DevelopmentCybersecurityCommunication SkillsAnalytical SkillsCollaboration

Posted 2024-11-09
Apply
Apply

📍 United States

🧭 Full-Time

🔍 Dating products

  • At least 3 years of professional experience in application security.
  • Ability to effectively partner and communicate with Engineering and Product teams.
  • Experience securing large-scale web/mobile applications, including performing security code reviews, vulnerability assessments, and manual testing for logic flaws.
  • Familiarity with dynamic and static application security tools.
  • Experience performing thorough threat modeling of web applications.
  • Bachelor’s Degree in Computing Security, Information Security, or related field.

  • Help with the implementation of security automation tools, static/dynamic code analysis, and evaluation of bug bounty reports.
  • Assist in research into suspected application vulnerabilities.
  • Maintain awareness of known vulnerabilities in application technologies used within Match Group.
  • Interface with engineering teams and effectively convey impact and provide remediation guidance for vulnerabilities.

CybersecurityData AnalysisData analysisCommunication SkillsAnalytical SkillsCollaboration

Posted 2024-11-09
Apply
Apply

📍 US

🔍 Healthcare technology

  • Strong grasp of cybersecurity principles.
  • Practical experience in managing security challenges.

  • Act as a key contributor to the cybersecurity team.
  • Utilize CrowdStrike’s advanced endpoint detection and response (EDR) tools.
  • Monitor and analyze security data to identify potential security issues.
  • Handle security incidents swiftly and effectively.
  • Enhance threat detection capabilities.

Cybersecurity

Posted 2024-11-08
Apply
Apply

📍 United States

🧭 Full-Time

🔍 Cybersecurity

🏢 Company: OPSWAT

  • Bachelor’s degree or college diploma in Information Security, Computer Science, Information Systems, or equivalent experience.
  • Expert knowledge of Microsoft Product Stack.
  • Full-stack IT infrastructure knowledge including securing applications and databases.
  • Direct experience in managing security infrastructure such as firewalls, IDS, IPS, and SIEM.
  • Experience in Security Assurance including penetration testing and threat modeling.
  • Strong working knowledge of IAM technologies and services.
  • Familiarity with IT service management disciplines.
  • Preferred certifications include CEH, Security+, CISSP, and various SANS certifications.

  • Contribute to designing and implementing solutions that support enterprise-wide security initiatives.
  • Design, build, maintain, tune, and enhance the effectiveness of Enterprise Security controls across various domains.
  • Perform risk assessments and security assurance on systems that support OPSWAT’s business operations.
  • Collaborate with the Governance Risk and Compliance team to develop security standards and policies.
  • Drive the remediation of identified security vulnerabilities through assessments.
  • Build security automation to enhance corporate infrastructure security.
  • Evaluate new Enterprise Security technology for improving security posture.
  • Partner with product management teams to provide product feedback.

AWSCybersecurityKubernetesProduct ManagementAzureCollaborationCI/CD

Posted 2024-10-23
Apply