Senior Information Security Engineer
Listed on 2026-01-12
-
IT/Tech
Cybersecurity, Information Security
Senior Information Security Engineer @ Discount Tire Overview
Here at Discount Tire, we celebrate the spirit of our people with extraordinary pride and enthusiasm. Our business has been growing for more than 60 years and now is the best time in our history to join us. We are opening more locations every year and we are always looking for qualified individuals to join us in our growth. We are a company that promotes from within, both in our retail and corporate operations.
As a Senior Information Security Engineer, you will be a critical part of our Enterprise Cybersecurity team, responsible for protecting the organization's data and information systems from both internal and external threats. This role requires a deep understanding of the latest security technologies, methodologies, and best practices to proactively safeguard our IT infrastructure and sensitive data across various platforms, including cloud, on-premises, and hybrid environments.
You will work closely with cross‑functional teams across IT to integrate security measures into every aspect of our infrastructure and operations. By implementing robust security frameworks, policies, and procedures, you will help mitigate risks, prevent data breaches, and ensure compliance with relevant industry standards and regulations.
This position provides an exciting opportunity to lead security initiatives and projects, mentor junior team members, and drive execution of the organization's security strategy and roadmap. You will be a key contributor in identifying and responding to emerging threats, conducting vulnerability assessments, and ensuring the ongoing security of our systems and applications. As a Senior Information Security Engineer, your role will be central in establishing a security‑first culture within the organization, ensuring our security posture evolves with the constantly changing threat landscape.
By joining our team, you will have the chance to make a direct impact on the security and integrity of the organization’s infrastructure, applications, and data, contributing to the overall success and growth of the business.
Essential Duties and Responsibilities- Implements, maintains and operates information system security controls and countermeasures across a variety of platforms and environments, including on‑premises, cloud, and hybrid infrastructures.
- Oversees the administration and optimization of security tools and technologies such as SIEM, intrusion detection/prevention systems, endpoint security, etc.
- Monitors information systems for security incidents and vulnerabilities; develops monitoring and visibility capabilities; reports on incidents, vulnerabilities, and trends.
- Responds to information system security incidents, including investigation of, countermeasures to, and recovery from computer‑based attacks, unauthorized access, and policy breaches; interacts and coordinates with third‑party incident responders, including law enforcement.
- Analyzes trends, news and changes in threat and compliance environment with respect to organizational risk; advises organization management and develops and executes plans for compliance and mitigation of risk; performs risk and compliance self‑assessments and engages and coordinates third‑party risk and compliance assessments.
- Develops and implements advanced detection capabilities to identify and respond to malicious activities in real time. Creates custom detection rules, tunes existing rules, and leverages threat intelligence feeds to enhance our security monitoring. Work closely with the security operations team to build and improve detection systems, ensuring they are capable of identifying emerging threats and attack techniques.
- Designs, develops, and implements security automation workflows and custom scripting to streamline incident response, threat detection, and remediation processes across the security technology stack.
- Conducts proactive threat hunting activities using advanced analytical techniques and threat intelligence to identify sophisticated attacks and advanced persistent threats that may evade traditional security controls; develops hypotheses and creates actionable…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).