The Security Engineer implements and monitors enterprise wide threat and vulnerability management solutions and enforces security best practices, policies, standards and guidance to ensure the safeguard of proprietary company data, physical infrastructure and resources from internal and external threats.
Perform vulnerability assessments of operating systems, applications, databases and network infrastructure components to detect, enumerate and classify major vulnerabilities for performing trend analysis and reporting to Enterprise customers through the use of vulnerability assessment tools and methodologies. Enforce the operational state of intrusion detection by monitoring, analysing and reporting on all network and application communication specific protocols for unwanted manipulation to systems Administer security operations management of operating systems, security applications and network infrastructure components to provide security configurations, controls for user account access, monitoring of services, centralized logging, network connectivity, job scheduling execution and routine maintenance through the use of administrative tools and methodologies. Participate in enterprise incident handling with the Security Team by detecting, analysing and performing remediation on attacks that deny the use of authorized applications, networks or systems. Conduct auditing of applications, operating systems and network. Assist in the attack and penetration testing of the enterprise system to perform information gathering, vulnerability detection, analysis and exploitation planning. Expand security knowledge on technologies and methodologies as it relates to operating systems, Firewalls, proxies, access controls, encryption, networking, programming/Scripting, auditing, vulnerability assessments, intrusion management and operations management.
Strong understanding of Security Methodologies. Knowledge of TCP IP/UDP/ICMP. Knowledge of the OSI Reference Model. Windows/Linux/Unix operating systems. Knowledge of networking components (Routers, Switches, load balancers, wireless access points, etc). Common knowledge of routing protocols. Knowledge of Firewalls, proxies, Mail Servers and web Servers. Knowledge of operational support for operating systems, applications and networks. Common knowledge of Client Server relationships. Basic knowledge of relational databases and structured query language. Knowledge of vulnerability assessments. Knowledge of intrusion management and its components. Knowledge of malicious code (worms, viruses, spyware, etc.). Knowledge of Virtual Private Networking, desired. Knowledge of multi tier environments.
Local candidates qualified and interested in this 6 month or longer contract opportunity should e-mail resumes with salary requirements.
JobServe USA - 2 years ago