Phoenix Staff

Information Security Engineer


  • Track the status of known information security exposures and work with information technology (IT) and business departments to promote remediation of known exposures.
  • Assist with InfoSec audit work including plan development and audit fieldwork.
  • Participate in discussions with external security assessment firms performing various engagements for the CU.
  • Assist in creating and collecting documentation from InfoSec, IT, and business departments in preparation for NCUA and external audit annual exams.
  • Support the implementation of new IT capabilities by participating in product evaluations, rollout plans, and system testing.
  • Work with SIEM system architecture to perform analysis of logs from several systems to identify unexpected or malicious activity.
  • May need to assist in the development of awareness training content for all new hires and others as applicable.
  • Assist in the discovery of system vulnerabilities, interpret the results, and validate potential exposures.
  • Review compliance against the security policies and standards.
  • Review the privilege levels assigned to system users, based on both Windows domain and application-specific roles as part of quarterly and other audits.
  • Perform system certification by reviewing servers and workstations against a baseline checklist to ensure only certified systems will be allowed to join the network.
  • Work with various platforms including the SIEMs, IDS/IPS, firewalls, anti-malware, EDR, vulnerability scanning, penetration testing, DLP, Network Access Control, and more.
  • Ensure controls specific to information security are designed, built, and engineered to meet compliance requirements.

 What you've got:
  • Bachelor's degree in Computer Information Systems, Computer Engineering, or Computer Science is required.
  • 4+ years of experience in Information Security Engineering and Cybersecurity.
  • 3+ years of direct hands-on experience with firewalls and network infrastructure.
  • 3+ years of direct hands-on experience with SIEM technologies.
  • 3+ years of experience identifying, assessing, and remediating technical security vulnerabilities.
  • A solid understanding of Microsoft Active Directory network environments.
  • CISSP certification is required.
  • Knowledge and understanding of data security controls including malware protection, firewalls, intrusion detection systems, content filtering, internet proxies, encryption controls, and log management solutions.
  • Knowledge of offensive security, with the ability to think like an adversary when hunting and responding to incidents.
  • The ability to communicate effectively, both verbally and in writing, with individuals and groups and strong proficiency in spreadsheet and word-process applications.
  • Hands-on experience with Cloud technologies and working knowledge of Azure services.
  • Understanding of IT audit principles, risk assessments, policies, and metrics.
  • Good understanding of cybersecurity frameworks, i.e., NIST CSF, NIST 800-53, NIST 800-53, and FFIEC; Experience in the financial services industry is helpful.
  • Investigative mindset, strong attention to detail, and the ability to adapt quickly.
  • Experience with multiple operating systems including Windows. Unix/Linux is helpful.
  • Experience with a programming or scripting language, such as Python or PowerShell.
  • Demonstrated experience of "hands-on" enterprise security knowledge.
  • Completion of other professional certifications such as, but not limited to, SANS GIAC certifications, OSCP, CCSP, CCSK, CEH, CISM, or CISA is highly desired.
  • Working knowledge of scripting languages is helpful.

Get new jobs update?

© 2022 P2PSEC. All rights reserved.