McDermott
Senior Principal Technology Spec (IT)
McDermott, Houston, Texas, United States, 77246
Job Overview:
Review, analyze, design, and advise on security controls, configurations, and implementations for IT projects. Continuously improve the integration and effectiveness of implemented technologies. Automate incident response playbooks for detected threats. Assist in the analysis, design and development of an Information Security roadmap aligned with McDermott’s business strategies. Inform on strategy and product level roadmap around security features and practical implementation. Maintain awareness of emerging technologies and identify opportunities for improving overall Cybersecurity. Market evaluation of new tools and techniques to enhance the security posture. Maintain awareness of cybersecurity threats, events, tactics, techniques, and procedures (TTPs). Essential Qualifications and Education: Minimum 7 years of experience in Cybersecurity as primary duty Working knowledge of the following Information Security domains, 4 required, network security is mandatory
Security Operations (Mandatory) Cloud Security Network Security Vulnerability and Threat Management Identity and Access Management (IAM) Database Security Application Security
Working knowledge of the following Information Security Systems
Firewalls and Management Consoles Secure Email Gateways (SEGs) Secure Web Gateway (SWGs) Infrastructure Configuration Management Tools Network Protocols and Troubleshooting PKI DNS
5+ years of experience with perimeter security administration (Web proxy, SMTP gateway, firewall) 3+ years of experience with security information and event management (SIEM) tools 1+ years of experience working with threat intelligence feeds and IOCs Working knowledge of firewall, router, network switch, VOIP, and wireless architecture and operation Experience with forensic investigation Experience with security incident and investigation reports/briefings Experience in a team-oriented, collaborative environment Strong analysis and problem-solving skills Strong oral and written communication skills Ability to multi-task and prioritize workload Familiarity with security orchestration, automation and response (SOAR) is a plus Desired Certification: CISSP, GSEC, Security+, CCNA, PCNSA (highly desired) Key Tasks and Responsibilities: Design security solutions and provide requirements for implementation of security solutions. Work with IT risk assessment function to ensure the proper security configurations and controls are implemented for IT projects. Serve as an internal trusted advisor providing security services, advice on security, and assist with compensating control alternatives where security requirements cannot be met. Research, identify, deploy, integrate, and manage cybersecurity perimeter technologies. Provide pros/cons of security solutions impact business strategies. Identify cybersecurity operations technology gaps, deficiencies, and recommend corrective actions. Create documentation of findings and recommendations (root cause and risk analysis). Assist with forensic investigations and incident response team (CIRT) activities. Assign work to Cyber SOC for remediation. Escalate pertinent findings in a timely manner. Leverage vendors and internal resources to interface various security tools to automate critical response tasks. Support Compliance managers in providing Cybersecurity artifacts. Align information cybersecurity operations with NIST, and ISO 27001 requirements.
#J-18808-Ljbffr
Review, analyze, design, and advise on security controls, configurations, and implementations for IT projects. Continuously improve the integration and effectiveness of implemented technologies. Automate incident response playbooks for detected threats. Assist in the analysis, design and development of an Information Security roadmap aligned with McDermott’s business strategies. Inform on strategy and product level roadmap around security features and practical implementation. Maintain awareness of emerging technologies and identify opportunities for improving overall Cybersecurity. Market evaluation of new tools and techniques to enhance the security posture. Maintain awareness of cybersecurity threats, events, tactics, techniques, and procedures (TTPs). Essential Qualifications and Education: Minimum 7 years of experience in Cybersecurity as primary duty Working knowledge of the following Information Security domains, 4 required, network security is mandatory
Security Operations (Mandatory) Cloud Security Network Security Vulnerability and Threat Management Identity and Access Management (IAM) Database Security Application Security
Working knowledge of the following Information Security Systems
Firewalls and Management Consoles Secure Email Gateways (SEGs) Secure Web Gateway (SWGs) Infrastructure Configuration Management Tools Network Protocols and Troubleshooting PKI DNS
5+ years of experience with perimeter security administration (Web proxy, SMTP gateway, firewall) 3+ years of experience with security information and event management (SIEM) tools 1+ years of experience working with threat intelligence feeds and IOCs Working knowledge of firewall, router, network switch, VOIP, and wireless architecture and operation Experience with forensic investigation Experience with security incident and investigation reports/briefings Experience in a team-oriented, collaborative environment Strong analysis and problem-solving skills Strong oral and written communication skills Ability to multi-task and prioritize workload Familiarity with security orchestration, automation and response (SOAR) is a plus Desired Certification: CISSP, GSEC, Security+, CCNA, PCNSA (highly desired) Key Tasks and Responsibilities: Design security solutions and provide requirements for implementation of security solutions. Work with IT risk assessment function to ensure the proper security configurations and controls are implemented for IT projects. Serve as an internal trusted advisor providing security services, advice on security, and assist with compensating control alternatives where security requirements cannot be met. Research, identify, deploy, integrate, and manage cybersecurity perimeter technologies. Provide pros/cons of security solutions impact business strategies. Identify cybersecurity operations technology gaps, deficiencies, and recommend corrective actions. Create documentation of findings and recommendations (root cause and risk analysis). Assist with forensic investigations and incident response team (CIRT) activities. Assign work to Cyber SOC for remediation. Escalate pertinent findings in a timely manner. Leverage vendors and internal resources to interface various security tools to automate critical response tasks. Support Compliance managers in providing Cybersecurity artifacts. Align information cybersecurity operations with NIST, and ISO 27001 requirements.
#J-18808-Ljbffr