Sr. Security Engineer Engineering - Honolulu, HI at Geebo

Sr. Security Engineer

Must Haves:
5
years security engineering experience - escalated troubleshooting, threat hunting, incident response, etc.
Strong enterprise level vulnerability management exp.
Customer facing experience/ great communicationPlusses:
Advanced GIAC/SANS certifications - GCIH, GCIA, GCFE, GCFA, GREM, GIAC, GSEC, GWAPTCompTIA Security+
Job Description:
An employer is looking for a Sr Security Engineer for a direct hire opportunity with a client located in Honolulu, HIThis position is a 100% customer-facing position with the mission of managing technical security controls and effectively managing and communicating vulnerabilities, exploits, and incidents to appropriate operations teams while tracking metrics in order to assist the customer in managing riskThe primary purpose is to provide day-to-day management of the client's security infrastructure or day-to-day monitoring, management, and response to security events.
Perform security assessments or reviews for Hawaiian Telcom customer's enterprise environmentWhile working with customer technical and executive staff, review the state of various technical and organizational controls processes, and policiesPerform gap analysis, comparing state to widely accepted best practices from vendors, regulatory and compliance bodies, and the security community at largeDocument these gaps, along with sensible and relevant recommendations, in findings reports that satisfy the needs of both a technical and non-technical audience.
Perform vulnerability scans and penetration tests of HT customer environments and controlsUsing expertise in the operation of commercial and open-source assessment tools, identify configuration flaws, missing patches, and gaps in defenses that could be exploited by attackersAssessment types will include social engineering and phishing, wireless, mobile device, and physical security, and web application penetration tests.
Assist HT customer staff with security needsProvide recommendations for security architecture, processes, and technologiesWrite technical policy, processes, procedures, standards, and other documentationPerform security research, furthering individual and team understanding of the threat landscape, as well as cutting-edge security technologiesAttend security conferences and participate in local security community eventsEvaluate products and tools that can improve the security services team's offerings, and provide value to customers.
Leadership role in cultivating and maintaining the relationship with HT customers, vendors, and partners.
Act as technical SME and work all technical escalations from the security operations team including outages and incidentsLead technical troubleshooting or incident handling events/calls on behalf of the client's security operations team and with the Network, Compute, and Client Operations Teams, internal and external information providers, and others as appropriate.
Lead all aspects of planning, documentation, and process development of HT client's global security operations; Drive development of technical procedures and guidelines for implementation and management of Security services as they relate to the global operations team.
Lead technical project efforts for the client's security operations teamParticipate in expansion of new opportunities with existing customers as they expand their global security operations requirements.
Recommended Skills Architecture Assessments Communication Forensic Examiner Certification Giac Certified Incident Handler Giac Certified Intrusion Analyst Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.