Position: Lead Information Security Engineer
Location: FULLY REMOTE
Duration: 12 MONTHS potential to extend
Requirements:
7 years of Information Security Engineering experience or equivalent demonstrated through one or a combination of the following: work experience training military experience education
4 years of Splunk Server Administration and Data Onboarding
4 years of Common Information Model (CIM) and Field Normalization
4 years of development of Splunk Alerts Reports and advanced XML / Dashboards
4 years of development of High Performance/Low Impact Splunk Searches
Understanding of Splunk tags eventtypes and macros
4 years of ability to measure/track Data Quality and resolve any related issues
Full understanding of the Splunk Architecture (enterprise clustered environments)
3 years of Linux CLI and Shell scripting
3 years of Splunk CLI configuration and management
3 years of Regular Expressions (RegEx)
Desired Qualifications:
Database Security Event Logging and Monitoring
Google Cloud Logging
Python3 knowledge and experience
Confluence Documentation experience
Day to Day Responsibilities/typical day look like:
Lead or participate in computer security incident response activities for moderately complex events
Conduct technical investigation of security related incidents and postincident digital forensics to identify causes and recommend future mitigation strategies
Provide security consulting on medium projects for internal clients to ensure conformity with corporate information security policy and standards
Design document test maintain and provide issue resolution recommendations for moderately complex security solutions related to networking cryptography cloud authentication and directory services email internet applications and endpoint security
Review and correlate security logs
Utilize subject matter knowledge in industry leading security solutions and best practices to implement one or more components of information security such as availability integrity confidentiality risk management threat identification modeling monitoring incident response access management and business continuity
Identify security vulnerabilities and issues perform risk assessments and evaluate remediation alternatives
Collaborate and consult with peers colleagues and managers to resolve issues and achieve goals
splunk alerts development,common information model (cim),regular expressions (regex),data quality measurement,macros,field normalization,event types,database security event logging,splunk cli management,cloud,high performance/low impact splunk searches,google cloud logging,splunk server administration,information security engineering,information security,splunk architecture,shell scripting,splunk,advanced xml/dashboards,splunk tags,security,confluence documentation,linux cli,python3