Summit Human Capital
Information Security Engineer [24-00367]
Summit Human Capital, Greenville, NC, United States
Summit Human Capital is seeking a highly motivated Information Security Engineer for one of our largest clients in the Greenville, SC metropolitan area. This role is eligible for a relocation assistance. The ideal candidate will meet the following criteria:
Requirements:
- 8+ Years of experience working in IT, with at least 4 years of experience engineering & architecting networks for Cybersecurity
- Experience with compliance standards and audit best practices ie. SOX compliance
- Knowledge of Microsoft Azure and Defender, Cado & Cisco Firewalls, and Panther/Splunk
- Technical engineering ability in Networks & Cybersecurity Infrastructure
- Knowledge of threat intelligence feeds, cybersecurity frameworks, and incident response methods.
Desired Skills
- Certifications such as CISSP, CISM, CySa+, CISA, CRISC, or other certifications sponsored by Microsoft, Cisco, or Offensive Security
- Knowledge of ITIL frameworks and understanding of maturity models.
Responsibilities:
- Manage incident response strategies to minimize impact and conduct technical investigations to identify exploit sources and assess their effects.
- Works with IT, business teams, and vendors on security initiatives, leading projects and technical implementations to address security issues.
- Assess identity verification and access protocols to uphold a zero-trust architecture for business applications in both production and development.
- Develop efficient security solutions with minimal technology overhead while ensuring strong security, researching and recommending necessary products and tools.
- Evaluate employee-related risks from unintentional security issues and conduct regular penetration tests to identify vulnerabilities.
- Develop and oversees enterprise-level firewall solutions, including next-gen firewalls, to enforce network security policies against advanced threats.
- Configure and implement security tools for cloud environments, such as cloud access security brokers and web application firewalls.