Information Security Specialist II

Posted on Sep 27, 2024 by Achieve
Tempe, AZ
Health & Safety
Immediate Start
Annual Salary
Full-Time
Job Description

The Information Security Specialist II will plan, develop, and implement solutions to defend against hacking, malware, insider threats, and other types of malicious activity. This role requires hands-on experience in developing and maintaining cyber detection capabilities, security monitoring, analyzing network vulnerabilities, and cyber incident handling. You will work as part of a team in a fast-paced environment to ensure the security and integrity of our organization's systems and data

The Role:

Design implement and maintain security tools and technologies, such as SIEM (Security Information and Event Management) systems, IDS/IPS (Intrusion Detection and Prevention Systems), web proxy, email filtering, and endpoint detection platforms. This includes creating scripts and processes for parsing incoming logs and optimizing them for effective searching.

Design scripts, integrations, and other automated which are launched when an attack has been detected responses (Security Orchestration, Automation and Response – SOAR).

Actively participate in the investigation of cyber security incidents. This includes investigating alerts, escalating incidents to stakeholders, implementing containment measures, and identifying the root cause.

Fine-tune the existing security monitoring systems and reduce false positives/negatives to ensure they are accurate and that useful information is being actioned. This includes analyzing logs, network traffic, and other recorded information to identify attacks that currently do not have detections. 

Stay informed about current cybersecurity threats, vulnerabilities, and trends to enhance detection and response capabilities.

Work with Business Applications Programmers, Systems Programmers, and other stakeholders who are building and modifying software and hardware, to ensure they integrate security standards, logging requirements and safeguards.

Review the configuration of our information systems and networks, and recommend configuration changes, system setting changes, network topology changes, and other modifications that would enhance the overall level of security

Participate in product evaluations for information security tools that are being considered for use within Achieve.

Reference: 202578298

https://jobs.careeraddict.com/post/95609371

Information Security Specialist II

Posted on Sep 27, 2024 by Achieve

Tempe, AZ
Health & Safety
Immediate Start
Annual Salary
Full-Time
Job Description

The Information Security Specialist II will plan, develop, and implement solutions to defend against hacking, malware, insider threats, and other types of malicious activity. This role requires hands-on experience in developing and maintaining cyber detection capabilities, security monitoring, analyzing network vulnerabilities, and cyber incident handling. You will work as part of a team in a fast-paced environment to ensure the security and integrity of our organization's systems and data

The Role:

Design implement and maintain security tools and technologies, such as SIEM (Security Information and Event Management) systems, IDS/IPS (Intrusion Detection and Prevention Systems), web proxy, email filtering, and endpoint detection platforms. This includes creating scripts and processes for parsing incoming logs and optimizing them for effective searching.

Design scripts, integrations, and other automated which are launched when an attack has been detected responses (Security Orchestration, Automation and Response – SOAR).

Actively participate in the investigation of cyber security incidents. This includes investigating alerts, escalating incidents to stakeholders, implementing containment measures, and identifying the root cause.

Fine-tune the existing security monitoring systems and reduce false positives/negatives to ensure they are accurate and that useful information is being actioned. This includes analyzing logs, network traffic, and other recorded information to identify attacks that currently do not have detections. 

Stay informed about current cybersecurity threats, vulnerabilities, and trends to enhance detection and response capabilities.

Work with Business Applications Programmers, Systems Programmers, and other stakeholders who are building and modifying software and hardware, to ensure they integrate security standards, logging requirements and safeguards.

Review the configuration of our information systems and networks, and recommend configuration changes, system setting changes, network topology changes, and other modifications that would enhance the overall level of security

Participate in product evaluations for information security tools that are being considered for use within Achieve.

Reference: 202578298

Share this job:
CareerAddict

Alert me to jobs like this:

Amplify your job search:

CV/résumé help

Increase interview chances with our downloads and specialist services.

CV Help

Expert career advice

Increase interview chances with our downloads and specialist services.

Visit Blog

Job compatibility

Increase interview chances with our downloads and specialist services.

Start Test