Information Security Engineer
Listed on 2025-12-05
-
IT/Tech
Cybersecurity, Information Security
The Information Security Engineer I is responsible for safeguarding our organization's computer networks and systems, ensuring the confidentiality, integrity, and availability of sensitive data. This role involves supporting the planning and implementation of our information security strategy, developing and enforcing security standards, and responding to security threats and incidents. The Information Security Engineer continuously monitors the security landscape, recommending and implementing security enhancements to protect against infiltration and cyber-attacks.
Whatyou will do here:
Security Engineering and System Enhancements
- Research and deploy advanced security technologies including identity and access management, email hygiene, vulnerability management, SIEM detection rules, or multi-factor authentication
- Design and implement security systems to detect and defend against modern attacks
- Collaborate with architecture and operations teams to design network and application defenses
- Develop security product roadmaps for advancing Information Security Program capabilities
- Leveraging cloud and on‑premise technologies such as MFA, Entra, and Active Directory, develop solutions for improving authentication security while reducing user impact
- Evaluate current vulnerability management program and develop improvements in detection and analysis
- Develop and maintain intrusion detection systems (IDS) and intrusion prevention systems (IPS)
- Scan and monitor networks to identify possible vulnerabilities and intrusions and build tools and strategies to resolve possible causes of security threats
- Evaluate current network design and configuration standards and recommend architectural changes to reduce risk and increase visibility
- Develop and maintain intrusion detection systems (IDS) and intrusion prevention systems (IPS)
- Scan and monitor networks to identify possible vulnerabilities and intrusions and build tools and strategies to resolve possible causes of security threats
- Design, implement, and maintain endpoint security tools to control applications, manage firewall data flows, and log aggregation, and malware detection and defenses
- Maintain detailed documentation of security configurations, incidents, and actions taken
- Prepare regular reports on security metrics, incidents, and compliance status for management review
- Perform on‑going security reviews and audits to validate, troubleshoot and improve applications' security
- Partner with internal and external auditors as well as federal regulators and department management with information security governance and compliance activity investigations
- Bachelor’s degree in Information Security, Computer Science, or a related field (preferred)
- Equivalent Combination Of Education And Experience Required
- 4+ years of experience in information security or a related role (required)
- 2+ years experience in a Financial Services (preferred)
- Detailed knowledge of security protocols, cryptography, and security technologies (required)
- Expertise with security tools such as firewalls, IDS/IPS, SIEM, and vulnerability scanners (required)
- Demonstrate knowledge and expertise of risk assessment tools, techniques and methods including development of procedures and incident response plans (required)
- Demonstrated knowledge of regulatory requirements and industry standards (required)
- Demonstrated competency securing technical systems and platforms (required)
- Demonstrated effective collaboration across the organization and ability to effectively communicate network security issues to peers and management (required)
- Strong problem-solving skills and the ability to work under pressure (required)
- Security + (preferred)
- Network + (preferred)
- PCIP (preferred)
- CISSP (preferred)
- CEH
- Certified Ethical Hacker (preferred)
We are proud to be an EEO/AA employer M/F/D/V. We maintain a drug‑free workplace and perform pre‑employment substance abuse testing.
For additional information about our organization, careers, and benefits visit:
#J-18808-Ljbffr(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).