Logo
Saxon Global

Saxon Global is hiring: Security/Vulnerability Engineer in Schiller Park

Saxon Global, Schiller Park, IL, US


Main thing is the manager is not seeing candidates with end point security experience. The manager also doesn't want someone with short tenures at projects. This is a hybrid onsite role. 2 days a week. One day in Mount Prospect and the other day you can choose to work in the Chicago office or Mount Prospect office. Role: Security/Vulnerability Engineer Duration: 6 months with extension Location: Chicago, IL Interview: Video Client: United Airlines Seeking an experienced senior level engineer with enterprise expertise in detecting, remediating and mitigating end point security vulnerabilities, extensive testing and supporting of critical applications and operating systems/updates against security vulnerabilities. Experience with evaluating business needs and then performing the following based on those needs: engineering a complete and secure end user experience, coordinating user acceptance testing, documenting, and engineering solutions based on discoveries of vulnerabilities, implementation and maintenance of security benchmark standards. Engineer will be working closely with various IT teams to mitigate security risks per corporate standards and SLAs. This position requires both technical as well as a non-technical policy-based skillset. MAJOR DUTIES AND RESPONSIBILITES Manage a test group of over 1,000 end points to include alpha testing of new patches, application updates, operating systems, etc. This group consists of workstations/laptops from every enterprise LOB which has always been a significant litmus test for a new application rollout post packaging/UAT testing. Applications and scope have included (but not limited to) Java, Adobe Reader, Edge Chromium, Chrome, Firefox, WinSCP, Notepad, Windows monthly OS patching and new feature functionality testing. Hardware vulnerability analysis is also in scope. Responsibilities related to above include planning and coordinating application version releases, ongoing meetings, reporting results, troubleshooting, discussions with developers/vendors regarding upgrades, etc. Prioritization of vulnerability remediations which includes mitigation strategies while simultaneously preventing productivity outages. Candidate will work towards proactively providing an endpoint environment that is sufficiently hardened against vulnerabilities along with assuring that engineering efforts adhere to established corporate policy. Implementation of best practices for hardening an endpoint environment including security framework standards (STIG/NIST/CIS). Proactively detect and analyze system, applications, code, and hardware weaknesses pre-production. Make remediation and mitigation recommendations accordingly. Ability to prepare and participate in corporate risk projects as well as IT audits related to PCI, HIPPA, etc. as necessary. Understanding personal and team roles, contributing to a positive work environment by building solid relationships with team members, proactively seeking guidance, clarification, and feedback. Apply enterprise vision and standards to all projects. Prepare detailed documentation of all engineered work and solutions. QUALIFICATIONS FOR THE JOB Education: Bachelors, Current industry certifications and/or Equivalent experience Experience: 5 years of experience providing engineering and operational direction as well as support of desktop infrastructure in a large enterprise environment required. Detection, prioritization, and mitigation strategies for CVE vulnerabilities on end point systems (including OS, 3rd Party Applications, GPOs, Registry modifications, etc.) Successful track record on implementation of security benchmarks STIG/NIST/CIS settings for an enterprise with minimal user impact. Engineering with focus on the key security concepts of Confidentiality, Integrity and Availability. Extensive regression testing for enterprise core applications, monthly critical security patches, OS updates, etc. Broad infrastructure technology concepts around software, hardware, networking, applications, end user interfaces, virtualization, business continuity, PCI compliance, internal auditing, reporting and total cost of ownership. Excellent technical knowledge and aptitude in the following areas: Active Directory, Workspace One, SCCM, GPOs, Windows 11, Windows 10, Kiosks, Virtual, Mobility, Reporting, strong documentation, and analytical skills. Preferred skills include: Qualys/Nessus (or equivalent vulnerability detection systems), Cisco Malware Analytics, Injection Hunter, Encryption Technologies, CVE database, CrowdStrike, etc. Airline experience is ideal Some knowledge of application packaging and PowerShell Interpretation is ideal.