Golden 1
IT - Info Sec Engineer - Information Security Engineer
Golden 1, Sacramento, California, United States, 95828
TITLE: INFORMATION SECURITY ENGINEERSTATUS: EXEMPTREPORTS TO: MANAGER - INFORMATION SECURITYDEPARTMENT: IT - INFORMATION SECURITYCODE: 11264GRADE: 25S
PAY GRADE: $107,300.00 - $117,000.00 ANNUALLY
GENERAL DESCRIPTION:
The Information Security Engineer is responsible for securing our sensitive data and critical assets from current and emerging threats for Golden 1. This position utilizes business knowledge and technical experience of cybersecurity to provide a secure environment for Golden 1's technology and information needs. The Information Security Engineer works closely with technology, application teams and business units to develop and test security structures designed to protect the computer and network infrastructure. This position is responsible for performing technical assessments of risks, threats and vulnerabilities related to new and existing information systems and supporting process within Golden 1 and external vendor connections.
TASKS, DUTIES, FUNCTIONS:
Analyze, assess, and respond to various internal and external threats identified by intrusion detection system (IDS)/intrusion prevention systems (IPS), web application firewall, vulnerability scan results and other data sources. Provide recommendations to IT management and monitor to ensure that recommendations are effectively implemented.Perform vulnerability assessments and penetration testing to identify exposures and risks, and report findings to management. Communicate and collaborate with partner teams, service owners, Information Security, and senior leadership to influence, prioritize, and drive the resolution of discovered security findings.Provide consultative security guidance on a constant stream of new products and technologies as a subject matter expert on Golden 1 projects and initiativesAdvise and participate in the development of business systems designs, ensuring hardening standards and configurations meet information security policy and procedures.Work in conjunction with IT to ensure appropriate procedures and processes are in place and effective in the detection and prevention of system intrusions as well as in establishing and managing a functional anti- virus/malware/DLP policy.Determine ways to monitor, measure, test and report on the effectiveness and efficiency of information security controls as well as compliance with information security policies and procedure.Implementation, administration, and maintenance of IDS/IPS, URL filter, email gateway, certificate issuance and control, network management, identity access control, and other information security infrastructure and controls as necessary.Regularly review IDS/IPS/SIEM rules, wireless rogue access point detection configuration and procedures and practices to ensure optimal effectiveness of security in the business environment.Participate in creating access privileges, control structures and resources to ensure optimal efficiency and adherence to information security standards.Engage with internaland external auditors during examinations, providing support and assistance in addressing audit recommendations.Participate in the security development of network systems architecture, design, and ongoing review of system configuration in collaboration with relevant team members and external partners.Keep management updated on outstanding issues that are not resolved in a timely manner in accordance with established escalation procedures.Develop and maintain a clear understanding of the business area needs and incorporating these needs into technical solutions by updating, developing, and maintaining a thorough knowledge of credit union procedures, products, service, and data processing systems.Monitor state and federal laws and regulations related to credit union compliance including Gramm-Leach-Bliley Act (GLBA), Payment Card Industry (PCI), Sarbanes-Oxley Act (SOX), etc. - and privacy laws.Performs other job-related duties as necessary
PHYSICAL SKILLS, ABILITIES, AND EXERTION UTILIZED IN THE
PERFORMANCE OF THESE TASKS:
Demonstrate strong oral and written communication skills with a focus on troubleshooting and error identification.Must possess sufficient manual dexterity to skillfully operate applicable computer hardware, a variety of hand tools and standard office equipment.ORGANIZATIONAL CONTACTS & RELATIONSHIPS:
INTERNAL: All levels of staff and management.EXTERNAL: Vendors, service providers, organizational groups, and other financial institutions as needed.QUALIFICATIONS:
EDUCATION:
Bachelor of Science in Computer Science, Management Information Systems, Information Security Information Assurance or equivalent work experience.EXPERIENCE:
3 years' experience in organizational information security, cybersecurity, information assurance or providing security consulting servicesWorking knowledge of traditional security controls and technologies, such as SIEM systems, IDS/IPS, public key infrastructure (PKI), IDAM systems, antivirus, and firewalls, in addition to newer offerings such as endpoint detection and response (EDR), threat intelligence platforms, security automation and orchestration, deception technologies and application controlsStrong technical and analytical skills, with a background in technology design, implementation, and deliveryWorking knowledge SIEM systems, firewalls, threat intelligence, security automation and orchestration solutions, IDS/IPS, data loss prevention (DLP) and other network and system monitoring toolsDemonstrates understanding of network systems and applications including: DNS, LDAP, virtualization, Database design/hardening, Email/secure messaging, Data Loss Prevention, and end point protection.Demonstrate understanding of the NIST CSF and tracking KPIs to validate the cybersecurity programDemonstrates understanding of Windows, Linux, and cloud computing technologies, including software-, infrastructure- and platform-as-a-service, as well as public, private and hybrid environments.Strong sense of ethics, integrity, and professionalismDemonstrates the ability to articulate methodologies and concepts; communicate effectively in providing technical guidance and expertise to management and other staff
PHYSICAL REQUIREMENTS:
Prolonged sitting throughout the workday to accomplish tasks.Availability for emergency and on call duty 24 hours a day, 7 days a week, as needed.Occasional travel may be required.Lift and carry communications equipment and computer hardware weighing up to fifty pounds.Corrected vision in the normal range required to configure, test, and troubleshoot network server hardware and data.Hearing within normal range.May work additional work hours to accomplish tasks.
LICENSES/CERTIFICATIONS:
Possession of a valid California Driver's License is requiredOne of the following security certifications: CEH, Security +, SSCP, SANS GIAC, PCNSA, or equivalent
#LI-Remote
REV. 11/18/2024
Other details
Job Family Senior ProfessionalJob Function Senior ProfessionalPay Type SalaryEmployment Indicator RemoteMin Hiring Rate $107,300.00Max Hiring Rate $117,000.00
Apply Now
PAY GRADE: $107,300.00 - $117,000.00 ANNUALLY
GENERAL DESCRIPTION:
The Information Security Engineer is responsible for securing our sensitive data and critical assets from current and emerging threats for Golden 1. This position utilizes business knowledge and technical experience of cybersecurity to provide a secure environment for Golden 1's technology and information needs. The Information Security Engineer works closely with technology, application teams and business units to develop and test security structures designed to protect the computer and network infrastructure. This position is responsible for performing technical assessments of risks, threats and vulnerabilities related to new and existing information systems and supporting process within Golden 1 and external vendor connections.
TASKS, DUTIES, FUNCTIONS:
Analyze, assess, and respond to various internal and external threats identified by intrusion detection system (IDS)/intrusion prevention systems (IPS), web application firewall, vulnerability scan results and other data sources. Provide recommendations to IT management and monitor to ensure that recommendations are effectively implemented.Perform vulnerability assessments and penetration testing to identify exposures and risks, and report findings to management. Communicate and collaborate with partner teams, service owners, Information Security, and senior leadership to influence, prioritize, and drive the resolution of discovered security findings.Provide consultative security guidance on a constant stream of new products and technologies as a subject matter expert on Golden 1 projects and initiativesAdvise and participate in the development of business systems designs, ensuring hardening standards and configurations meet information security policy and procedures.Work in conjunction with IT to ensure appropriate procedures and processes are in place and effective in the detection and prevention of system intrusions as well as in establishing and managing a functional anti- virus/malware/DLP policy.Determine ways to monitor, measure, test and report on the effectiveness and efficiency of information security controls as well as compliance with information security policies and procedure.Implementation, administration, and maintenance of IDS/IPS, URL filter, email gateway, certificate issuance and control, network management, identity access control, and other information security infrastructure and controls as necessary.Regularly review IDS/IPS/SIEM rules, wireless rogue access point detection configuration and procedures and practices to ensure optimal effectiveness of security in the business environment.Participate in creating access privileges, control structures and resources to ensure optimal efficiency and adherence to information security standards.Engage with internaland external auditors during examinations, providing support and assistance in addressing audit recommendations.Participate in the security development of network systems architecture, design, and ongoing review of system configuration in collaboration with relevant team members and external partners.Keep management updated on outstanding issues that are not resolved in a timely manner in accordance with established escalation procedures.Develop and maintain a clear understanding of the business area needs and incorporating these needs into technical solutions by updating, developing, and maintaining a thorough knowledge of credit union procedures, products, service, and data processing systems.Monitor state and federal laws and regulations related to credit union compliance including Gramm-Leach-Bliley Act (GLBA), Payment Card Industry (PCI), Sarbanes-Oxley Act (SOX), etc. - and privacy laws.Performs other job-related duties as necessary
PHYSICAL SKILLS, ABILITIES, AND EXERTION UTILIZED IN THE
PERFORMANCE OF THESE TASKS:
Demonstrate strong oral and written communication skills with a focus on troubleshooting and error identification.Must possess sufficient manual dexterity to skillfully operate applicable computer hardware, a variety of hand tools and standard office equipment.ORGANIZATIONAL CONTACTS & RELATIONSHIPS:
INTERNAL: All levels of staff and management.EXTERNAL: Vendors, service providers, organizational groups, and other financial institutions as needed.QUALIFICATIONS:
EDUCATION:
Bachelor of Science in Computer Science, Management Information Systems, Information Security Information Assurance or equivalent work experience.EXPERIENCE:
3 years' experience in organizational information security, cybersecurity, information assurance or providing security consulting servicesWorking knowledge of traditional security controls and technologies, such as SIEM systems, IDS/IPS, public key infrastructure (PKI), IDAM systems, antivirus, and firewalls, in addition to newer offerings such as endpoint detection and response (EDR), threat intelligence platforms, security automation and orchestration, deception technologies and application controlsStrong technical and analytical skills, with a background in technology design, implementation, and deliveryWorking knowledge SIEM systems, firewalls, threat intelligence, security automation and orchestration solutions, IDS/IPS, data loss prevention (DLP) and other network and system monitoring toolsDemonstrates understanding of network systems and applications including: DNS, LDAP, virtualization, Database design/hardening, Email/secure messaging, Data Loss Prevention, and end point protection.Demonstrate understanding of the NIST CSF and tracking KPIs to validate the cybersecurity programDemonstrates understanding of Windows, Linux, and cloud computing technologies, including software-, infrastructure- and platform-as-a-service, as well as public, private and hybrid environments.Strong sense of ethics, integrity, and professionalismDemonstrates the ability to articulate methodologies and concepts; communicate effectively in providing technical guidance and expertise to management and other staff
PHYSICAL REQUIREMENTS:
Prolonged sitting throughout the workday to accomplish tasks.Availability for emergency and on call duty 24 hours a day, 7 days a week, as needed.Occasional travel may be required.Lift and carry communications equipment and computer hardware weighing up to fifty pounds.Corrected vision in the normal range required to configure, test, and troubleshoot network server hardware and data.Hearing within normal range.May work additional work hours to accomplish tasks.
LICENSES/CERTIFICATIONS:
Possession of a valid California Driver's License is requiredOne of the following security certifications: CEH, Security +, SSCP, SANS GIAC, PCNSA, or equivalent
#LI-Remote
REV. 11/18/2024
Other details
Job Family Senior ProfessionalJob Function Senior ProfessionalPay Type SalaryEmployment Indicator RemoteMin Hiring Rate $107,300.00Max Hiring Rate $117,000.00
Apply Now