Information Security Engineer
Large Manufacturing Client
Hybrid 3x/week onsite in Greenville SC
FULL - TIME ROLE!
On a W2 basis ONLY (no corp to corp or 1099)
Pay: $120,000-$140,000yr W2
Requirements:
- Bachelors degree
- 5+ years cybersecurity experience
- Experience with Azure and Defender
- SOX, SOC1 and/or SOC2 experience
- Ideally experience building and managing security platforms
Job Summary:
We are seeking a highly qualified and dedicated Information Security Engineer to join our team. The ideal candidate will possess extensive knowledge of the latest best practices and tools for safeguarding client, company, employee, and end-user data, communications, and systems. Expertise in various cybersecurity domains such as identity management, network security, security architecture, software development security, compliance, and security operations are essential.
Duties and Responsibilities:
· Manages incident response strategies to reduce impact. Conducts technical and forensic investigations to trace exploit sources and evaluate their consequences.
· Collaborates with IT, business teams, and vendors on security program initiatives, leading projects, and technical implementations to resolve security-related issues.
· Evaluates identity verification and access protocols to maintain a zero-trust architecture for business application systems in both production and development environments.
· Develops security solutions efficiently with a minimal technology footprint whenever feasible while maintaining robust security. Conducts research, performs analyses, and recommends necessary security products, services, and tools.
· Evaluates and examines employee risk stemming from unintentional, incidental, and awareness-related security problems. Performs regular penetration tests by simulating system attacks to identify vulnerabilities that can be exploited.
· Develop, deploy, and oversee enterprise-level firewall solutions, including next-generation firewalls, to ensure network security policies are upheld and to defend against sophisticated threats.
· Configure and implement security tools and technologies tailored for cloud environments, such as cloud access security brokers, web application firewalls, and cloud-native security services.