ApplyπΈ 124000.0 - 155000.0 USD per year
π Software Development
π’ Company: Rechargeπ₯ 11-50Electronics
- 5+ years of experience in network and/or security roles, with a focus on edge security tools
- 2+ years experience with k8s, Helm, IaC, Terraform, Docker, Linux, Kubernetes, etc
- 2+ years experience with Monitoring, Metrics and Logging (Splunk) solutions
- 2+ years experience in cloud-native environments such as GCP, AWS, or Azure
- Bachelorβs degree in Computer Science, Information Technology, or related field
- Relevant certifications such as CISSP, CCSP, GSEC, or equivalent
- Network security design experience and an an in-depth knowledge of network protocols, firewall configurations, and intrusion detection/prevention systems
- Cloud infrastructure security knowledge including hardening standards, CSPM tools, VPN/remote access management and authentication technologies such as SAML, OAuth
- Robust understanding of WAF technologies such as Akamai, Cloudflare, Google Cloud Armor, Imperva, etc
- Experience configuring SIEM tools such as Splunk, LogRhythm, FileVault, etc
- Extensive knowledge of Vulnerability Management practices
- Understanding of virus and malware defense systems such as Crowdstrike, Sentinel One, Trend Micro, etc
- Understanding of backup systems and disaster recovery planning
- Experience with security assessment tools and techniques
- Design, implement, and maintain secure cloud / network architectures, ensuring the confidentiality, integrity, and availability of data.
- Review IAM and access controls to ensure adherence to the principles of least privilege.
- Create and maintain network and security documentation.
- Collaborate with cross-functional teams to integrate security measures into network designs and implementations.
- Manage Endpoint / EDR / XDR / Anti-malware tools and policies
- Monitor network traffic for unusual activity and respond to security incidents in a timely manner.
- Audit and review user and merchant network activity to ensure system and data safety
- IDS/IPS management and response
- Firewall rule review and management
- WAF configuration and rule tuning
- Conduct regular vulnerability assessments on network infrastructure to identify and remediate potential security risks.
- Stay abreast of emerging threats and vulnerabilities, applying proactive measures to protect against them.
- Maintain and continuously improve incident response plans, participate in tabletop exercises, and lead incident response efforts when necessary.
- Collaborate with internal teams and external stakeholders to investigate and mitigate security incidents.
- Mentor other engineers on security configurations and best practices
- Investigate, analyze and evangelize good security posture throughout the organization
- Automate security tools and processes where possible
- Live by and champion our values: Accountability, Collaboration, Iteration and Details
Posted about 22 hours ago
Apply