Information Security Specialist II
Posted on Sep 27, 2024 by Achieve
Tempe, AZ
Health & Safety
Immediate Start
Annual Salary
Full-Time
Job Description
The Information Security Specialist II will plan, develop, and implement solutions to defend against hacking, malware, insider threats, and other types of malicious activity. This role requires hands-on experience in developing and maintaining cyber detection capabilities, security monitoring, analyzing network vulnerabilities, and cyber incident handling. You will work as part of a team in a fast-paced environment to ensure the security and integrity of our organization's systems and data
The Role:
Design implement and maintain security tools and technologies, such as SIEM (Security Information and Event Management) systems, IDS/IPS (Intrusion Detection and Prevention Systems), web proxy, email filtering, and endpoint detection platforms. This includes creating scripts and processes for parsing incoming logs and optimizing them for effective searching.
Design scripts, integrations, and other automated which are launched when an attack has been detected responses (Security Orchestration, Automation and Response – SOAR).
Actively participate in the investigation of cyber security incidents. This includes investigating alerts, escalating incidents to stakeholders, implementing containment measures, and identifying the root cause.
Fine-tune the existing security monitoring systems and reduce false positives/negatives to ensure they are accurate and that useful information is being actioned. This includes analyzing logs, network traffic, and other recorded information to identify attacks that currently do not have detections.
Stay informed about current cybersecurity threats, vulnerabilities, and trends to enhance detection and response capabilities.
Work with Business Applications Programmers, Systems Programmers, and other stakeholders who are building and modifying software and hardware, to ensure they integrate security standards, logging requirements and safeguards.
Review the configuration of our information systems and networks, and recommend configuration changes, system setting changes, network topology changes, and other modifications that would enhance the overall level of security
Participate in product evaluations for information security tools that are being considered for use within Achieve.
The Information Security Specialist II will plan, develop, and implement solutions to defend against hacking, malware, insider threats, and other types of malicious activity. This role requires hands-on experience in developing and maintaining cyber detection capabilities, security monitoring, analyzing network vulnerabilities, and cyber incident handling. You will work as part of a team in a fast-paced environment to ensure the security and integrity of our organization's systems and data
The Role:
Design implement and maintain security tools and technologies, such as SIEM (Security Information and Event Management) systems, IDS/IPS (Intrusion Detection and Prevention Systems), web proxy, email filtering, and endpoint detection platforms. This includes creating scripts and processes for parsing incoming logs and optimizing them for effective searching.
Design scripts, integrations, and other automated which are launched when an attack has been detected responses (Security Orchestration, Automation and Response – SOAR).
Actively participate in the investigation of cyber security incidents. This includes investigating alerts, escalating incidents to stakeholders, implementing containment measures, and identifying the root cause.
Fine-tune the existing security monitoring systems and reduce false positives/negatives to ensure they are accurate and that useful information is being actioned. This includes analyzing logs, network traffic, and other recorded information to identify attacks that currently do not have detections.
Stay informed about current cybersecurity threats, vulnerabilities, and trends to enhance detection and response capabilities.
Work with Business Applications Programmers, Systems Programmers, and other stakeholders who are building and modifying software and hardware, to ensure they integrate security standards, logging requirements and safeguards.
Review the configuration of our information systems and networks, and recommend configuration changes, system setting changes, network topology changes, and other modifications that would enhance the overall level of security
Participate in product evaluations for information security tools that are being considered for use within Achieve.
Reference: 202578298
https://jobs.careeraddict.com/post/95609371
Information Security Specialist II
Posted on Sep 27, 2024 by Achieve
Tempe, AZ
Health & Safety
Immediate Start
Annual Salary
Full-Time
Job Description
The Information Security Specialist II will plan, develop, and implement solutions to defend against hacking, malware, insider threats, and other types of malicious activity. This role requires hands-on experience in developing and maintaining cyber detection capabilities, security monitoring, analyzing network vulnerabilities, and cyber incident handling. You will work as part of a team in a fast-paced environment to ensure the security and integrity of our organization's systems and data
The Role:
Design implement and maintain security tools and technologies, such as SIEM (Security Information and Event Management) systems, IDS/IPS (Intrusion Detection and Prevention Systems), web proxy, email filtering, and endpoint detection platforms. This includes creating scripts and processes for parsing incoming logs and optimizing them for effective searching.
Design scripts, integrations, and other automated which are launched when an attack has been detected responses (Security Orchestration, Automation and Response – SOAR).
Actively participate in the investigation of cyber security incidents. This includes investigating alerts, escalating incidents to stakeholders, implementing containment measures, and identifying the root cause.
Fine-tune the existing security monitoring systems and reduce false positives/negatives to ensure they are accurate and that useful information is being actioned. This includes analyzing logs, network traffic, and other recorded information to identify attacks that currently do not have detections.
Stay informed about current cybersecurity threats, vulnerabilities, and trends to enhance detection and response capabilities.
Work with Business Applications Programmers, Systems Programmers, and other stakeholders who are building and modifying software and hardware, to ensure they integrate security standards, logging requirements and safeguards.
Review the configuration of our information systems and networks, and recommend configuration changes, system setting changes, network topology changes, and other modifications that would enhance the overall level of security
Participate in product evaluations for information security tools that are being considered for use within Achieve.
The Information Security Specialist II will plan, develop, and implement solutions to defend against hacking, malware, insider threats, and other types of malicious activity. This role requires hands-on experience in developing and maintaining cyber detection capabilities, security monitoring, analyzing network vulnerabilities, and cyber incident handling. You will work as part of a team in a fast-paced environment to ensure the security and integrity of our organization's systems and data
The Role:
Design implement and maintain security tools and technologies, such as SIEM (Security Information and Event Management) systems, IDS/IPS (Intrusion Detection and Prevention Systems), web proxy, email filtering, and endpoint detection platforms. This includes creating scripts and processes for parsing incoming logs and optimizing them for effective searching.
Design scripts, integrations, and other automated which are launched when an attack has been detected responses (Security Orchestration, Automation and Response – SOAR).
Actively participate in the investigation of cyber security incidents. This includes investigating alerts, escalating incidents to stakeholders, implementing containment measures, and identifying the root cause.
Fine-tune the existing security monitoring systems and reduce false positives/negatives to ensure they are accurate and that useful information is being actioned. This includes analyzing logs, network traffic, and other recorded information to identify attacks that currently do not have detections.
Stay informed about current cybersecurity threats, vulnerabilities, and trends to enhance detection and response capabilities.
Work with Business Applications Programmers, Systems Programmers, and other stakeholders who are building and modifying software and hardware, to ensure they integrate security standards, logging requirements and safeguards.
Review the configuration of our information systems and networks, and recommend configuration changes, system setting changes, network topology changes, and other modifications that would enhance the overall level of security
Participate in product evaluations for information security tools that are being considered for use within Achieve.
Reference: 202578298
Share this job:
Alert me to jobs like this:
Amplify your job search:
Expert career advice
Increase interview chances with our downloads and specialist services.
Visit Blog