As a Senior Security Systems Engineer at Spreetail, you will leverage industry-leading expertise to design and implement security architectures that align with business, technology, and security objectives. Serving as the primary security architect, you will drive cybersecurity transformation projects, resolve security design challenges, and ensure seamless integration across multiple teams. Your role involves analyzing network traffic, identifying threats, and utilizing event correlation to assess the effectiveness of security measures. By providing timely detection and response to potential cyber threats, you will safeguard enterprise systems against attacks and anomalous activities. Additionally, you will evaluate malicious activity to understand exploitation methods and mitigate security risks effectively.
This position is 100% remote in select states:
In order to qualify for remote work, candidates need to reside or be willing to move to Alaska, Arizona, Colorado, Florida, Georgia, Hawaii, Illinois, Indiana, Kentucky, Massachusetts, Nebraska, Nevada, New Hampshire, New Jersey, North Dakota, Pennsylvania, South Dakota, Tennessee, Texas, Utah, Washington, or Wyoming.
How you will achieve success:
Uses industry-leading expertise and understanding of information and security technology to develop solution architectures and blueprints based on business, technology, and security objectives.
Serve as the primary security architect on all initiatives, resolve security architecture/design issues across multiple teams, and, focus on addressing top cyber security priorities and transformation projects.
Operate as a technical subject matter expert and advise project teams regarding integration with multiple cybersecurity technologies. Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities. Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, and effects on system and information.
What experiences will help you in this role:
Technical Cyber Security Certification through one of the recognized bodies preferred (such as CISSP, CISM, CISA, CEH, SANS/GIAC, CERT). Typically, 15+ years of relevant experience with 4+ years of experience in enterprise environments.
Advanced level knowledge of information technology (IT) security principles and methods, and network traffic analysis methods. Advanced level knowledge of how traffic flows across the network.
Knowledge of new and emerging information technology (IT) and cybersecurity technologies and security system design tools, methods, and techniques.
Knowledge of what constitutes a network attack and its relationship to both threats and vulnerabilities and defense-in-depth principles and network security architecture. Knowledge of system administration, network, and operating system hardening techniques.
Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). Knowledge of cyber attackers (e.g., script kiddies, insider threat, nation/non-nation state-sponsored).
Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).