Hyundai Autoever America
20178 - Security Engineer III
Hyundai Autoever America, West Point, Georgia, United States, 31833
20178 - Security Engineer III
Do you have strong knowledge and experience in Endpoint Security, including Endpoint Detection & Response (EDR), AV (Antivirus), DLP (Data Loss Prevention)? If so, please keep reading!
PURPOSE:Participate in all information systems and network security aspects, including intrusion detection, incident response, vulnerability assessment, application security, and corporate information security policy compliance. Primarily be responsible for implementing, operating, and improving security technologies, including DLP, Antivirus, IPS/IDS, End Point Protection, Database Activity Monitoring, Web Application Firewall, and processes.
ESSENTIAL FUNCTIONS:- Design, build, test, and deploy new security technologies, which include the development of the operational manual and run books - Provides technical security operations engineering services to support and update existing security systems and works to automate processes related to security implementations, monitoring, and enforcement - Investigates, recommends, evaluates, deploys, and integrates operational security tools and techniques to improve our ability to protect corporate assets and infrastructure - Participate in technical risk assessments and security exposure analyses of systems, networks, and business applications - Analyzes network security elements and overall network security architectural designs to ensure secure and optimal system and network performance and cost-effectiveness - Oversees the installation, configuration, and supportive processes of security technologies - Participate in or lead the Incident Response activities - Interacts with internal and external clients on security operations requirements, identifies security processes, and develops strategies/solutions to security issues - Keeps fully abreast of trends and changing technologies as they relate to IT and Network Engineering and Information Security fields - Lead or assist in periodic or ad-hoc security reports that provide relevant situational awareness to our senior stakeholders Security Operations / Administration - Monitor and manage our networks and infrastructure environment for attacks, malicious software, and possible intrusions, which includes the follow-up of complete remediation of infected systems - Required to be on-call (after hours) per the established rotational schedule - Implement changes to our security technologies/infrastructure following standard and change control policies/procedures - Evaluate, implement, tune, and operate Security Solutions such as IPS, Vulnerability scanning tools, encryption capabilities, etc
•Other Duties:•Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.
SCOPES
SUPERVISORY RESPONSIBILITY - N/A
DECISION MAKING/DISCRETION -Works on problems of diverse scope where analysis of data requires evaluation of identifiable factors. Demonstrates good judgment in selecting methods and techniques for obtaining solutions. Networks with senior internal and external personnel in own area of expertise.RESULTS - Escalate as needed to address business need when determined to be out of scope of position responsibility.STRATEGY DEVELOPMENT -
Normally receives little instructions on day-to-day work, general instructions on new assignments.
EDUCATION -
Bachelor’s Degree in Computer Science, Information Systems or related field, or equivalent experience and relevant Certifications.
WORK EXPERIENCE - •3-5 years of experience performing Security Engineering and the related Planning / Operations.
SKILLS/KNOWLEDGE
- • Experience in medium to complex computing environments, with advanced knowledge of security technologies and services • Hands-on experience with at least two or more of the following Enterprise Security Technologies: - Network Intrusion Prevention / Detection - Virtual Private Networks; SSL, IPsec, and Site-to-Site - Enterprise Class Stateful Inspection Firewalls - Network Access Controls in context to Identity management - Windows Server OS & Desktop OS - Network Packet Inspection - Directory Services, including LDAP, AD, and Secure Authentication Technologies • Experience in implementing Information Security technologies and processes required. • High-level understanding of server/virtual machine and network architecture and their security dependencies. • Deep-level understanding of network concepts such as routing & switching, subnetting, DCHP, DNS, etc. • Endpoint Security, including Endpoint Detection & Response (EDR), AV (Antivirus), DLP (Data Loss Prevention) • Web filtering (e.g.: Palo Alto, Forcepoint, Sophos, etc.) solutions and their operation • Experience in defining Information Security strategies and frameworks • Experience integrating security technologies into corporate operations frameworks. • Ability to communicate effectively with client staff at all levels, from technical to executive • Multi-task oriented in a team environment • Demonstrated ability to pay close attention to detail • Knowledge of Information Security risk assessment methodologies and standards • Experience developing technical documentation, including reports, proposals, statements of work, and whitepapers • Ability to work independently, undertaking and completing project tasks on schedule with minimal supervisionCERTIFICATIONS - •Security +, CISSP, CISSP-ISSAP, SANS, or other professional certifications applicable to security engineering are preferred.
PHYSICAL REQUIREMENTS
-
Requires good hand-eye coordination, arm, hand and finger dexterity, including ability to grasp, and visual acuity to use a keyboard, operate equipment and read information.
TOOLS AND EQUIPMENT
-Employee must be able to use a telephone, computer, keyboard, printer, copy machine, Microsoft Word, Excel
TRAVEL TIME
- Occasional travel may be required.
#J-18808-Ljbffr
Do you have strong knowledge and experience in Endpoint Security, including Endpoint Detection & Response (EDR), AV (Antivirus), DLP (Data Loss Prevention)? If so, please keep reading!
PURPOSE:Participate in all information systems and network security aspects, including intrusion detection, incident response, vulnerability assessment, application security, and corporate information security policy compliance. Primarily be responsible for implementing, operating, and improving security technologies, including DLP, Antivirus, IPS/IDS, End Point Protection, Database Activity Monitoring, Web Application Firewall, and processes.
ESSENTIAL FUNCTIONS:- Design, build, test, and deploy new security technologies, which include the development of the operational manual and run books - Provides technical security operations engineering services to support and update existing security systems and works to automate processes related to security implementations, monitoring, and enforcement - Investigates, recommends, evaluates, deploys, and integrates operational security tools and techniques to improve our ability to protect corporate assets and infrastructure - Participate in technical risk assessments and security exposure analyses of systems, networks, and business applications - Analyzes network security elements and overall network security architectural designs to ensure secure and optimal system and network performance and cost-effectiveness - Oversees the installation, configuration, and supportive processes of security technologies - Participate in or lead the Incident Response activities - Interacts with internal and external clients on security operations requirements, identifies security processes, and develops strategies/solutions to security issues - Keeps fully abreast of trends and changing technologies as they relate to IT and Network Engineering and Information Security fields - Lead or assist in periodic or ad-hoc security reports that provide relevant situational awareness to our senior stakeholders Security Operations / Administration - Monitor and manage our networks and infrastructure environment for attacks, malicious software, and possible intrusions, which includes the follow-up of complete remediation of infected systems - Required to be on-call (after hours) per the established rotational schedule - Implement changes to our security technologies/infrastructure following standard and change control policies/procedures - Evaluate, implement, tune, and operate Security Solutions such as IPS, Vulnerability scanning tools, encryption capabilities, etc
•Other Duties:•Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.
SCOPES
SUPERVISORY RESPONSIBILITY - N/A
DECISION MAKING/DISCRETION -Works on problems of diverse scope where analysis of data requires evaluation of identifiable factors. Demonstrates good judgment in selecting methods and techniques for obtaining solutions. Networks with senior internal and external personnel in own area of expertise.RESULTS - Escalate as needed to address business need when determined to be out of scope of position responsibility.STRATEGY DEVELOPMENT -
Normally receives little instructions on day-to-day work, general instructions on new assignments.
EDUCATION -
Bachelor’s Degree in Computer Science, Information Systems or related field, or equivalent experience and relevant Certifications.
WORK EXPERIENCE - •3-5 years of experience performing Security Engineering and the related Planning / Operations.
SKILLS/KNOWLEDGE
- • Experience in medium to complex computing environments, with advanced knowledge of security technologies and services • Hands-on experience with at least two or more of the following Enterprise Security Technologies: - Network Intrusion Prevention / Detection - Virtual Private Networks; SSL, IPsec, and Site-to-Site - Enterprise Class Stateful Inspection Firewalls - Network Access Controls in context to Identity management - Windows Server OS & Desktop OS - Network Packet Inspection - Directory Services, including LDAP, AD, and Secure Authentication Technologies • Experience in implementing Information Security technologies and processes required. • High-level understanding of server/virtual machine and network architecture and their security dependencies. • Deep-level understanding of network concepts such as routing & switching, subnetting, DCHP, DNS, etc. • Endpoint Security, including Endpoint Detection & Response (EDR), AV (Antivirus), DLP (Data Loss Prevention) • Web filtering (e.g.: Palo Alto, Forcepoint, Sophos, etc.) solutions and their operation • Experience in defining Information Security strategies and frameworks • Experience integrating security technologies into corporate operations frameworks. • Ability to communicate effectively with client staff at all levels, from technical to executive • Multi-task oriented in a team environment • Demonstrated ability to pay close attention to detail • Knowledge of Information Security risk assessment methodologies and standards • Experience developing technical documentation, including reports, proposals, statements of work, and whitepapers • Ability to work independently, undertaking and completing project tasks on schedule with minimal supervisionCERTIFICATIONS - •Security +, CISSP, CISSP-ISSAP, SANS, or other professional certifications applicable to security engineering are preferred.
PHYSICAL REQUIREMENTS
-
Requires good hand-eye coordination, arm, hand and finger dexterity, including ability to grasp, and visual acuity to use a keyboard, operate equipment and read information.
TOOLS AND EQUIPMENT
-Employee must be able to use a telephone, computer, keyboard, printer, copy machine, Microsoft Word, Excel
TRAVEL TIME
- Occasional travel may be required.
#J-18808-Ljbffr