CERES Group
The Infrastructure Security Engineer will secure the Clients infrastructure against insider and outsider threats. They will investigate suspicious activity while operating state-of-the-art security tools for threat detection, response, and remediation. They will be responsible for analyzing and defending the network, server, and end user environment in a multitude of situations. This is a critical role for the Compliance and Security team, which protects the customers, employees, brand, and data.
Required Skills: Bachelor's degree in Cybersecurity, Systems Engineering, Computer Science, Information Systems Management, or similar 3-5 years' Experience as a Security Engineer Experience with firewalls, proxy servers, and VPNs Experience with information security best practices and security frameworks Experience with current cyberthreats and tactics used to infiltrate computer networks Experience with network intrusion detection and response operations Experience with vulnerability scanning tools (e.g., Nessus, Qualys) Current security certifications Solid knowledge of computer networks and common protocols:TCP/IP, UDP, DNS, FTP, SSH, SSL/TLS, HTTP, etc Experience using, configuring, installing, and tuning information security applications and appliances Knowledge of network analysis tools used to identify software communications vulnerabilities Experience analyzing network traffic and using Deep Packet Inspection tools Advanced knowledge of Windows, Mac, and variants of Linux OS Advanced understanding of attack vectors Ability to respond to changing priorities and operate effectively in a dynamic environment Ability to weigh business needs against security concerns Experience applying cybersecurity concepts and best practices Interest in security, network, and server monitoring technologies
LI-JW1
Required Skills: Bachelor's degree in Cybersecurity, Systems Engineering, Computer Science, Information Systems Management, or similar 3-5 years' Experience as a Security Engineer Experience with firewalls, proxy servers, and VPNs Experience with information security best practices and security frameworks Experience with current cyberthreats and tactics used to infiltrate computer networks Experience with network intrusion detection and response operations Experience with vulnerability scanning tools (e.g., Nessus, Qualys) Current security certifications Solid knowledge of computer networks and common protocols:TCP/IP, UDP, DNS, FTP, SSH, SSL/TLS, HTTP, etc Experience using, configuring, installing, and tuning information security applications and appliances Knowledge of network analysis tools used to identify software communications vulnerabilities Experience analyzing network traffic and using Deep Packet Inspection tools Advanced knowledge of Windows, Mac, and variants of Linux OS Advanced understanding of attack vectors Ability to respond to changing priorities and operate effectively in a dynamic environment Ability to weigh business needs against security concerns Experience applying cybersecurity concepts and best practices Interest in security, network, and server monitoring technologies
LI-JW1