FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.
Sorry, we can't find that. Please try a different city or state.

Information Security Engineer

This job has expired and is no longer available.
APPLY NOW
Apply Now
×
FIND
PERSONALIZED JOBS

Sorry, we can't find that. Please try a different city or state.

CONTENT HAS
BEEN UNLOCKED
Close this window to view unlocked content
or
find interesting jobs in

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign Up

SIGN UP TO UNLOCK CONTENT

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign up to save the job and get personalized job recommendations.

Sign up to dismiss the job and get personalized job recommendations.

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Already have an account? Log in

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Company Saved

Answer a few questions and view jobs at that match your preferences.

Where do you want to work?

Job Saved

See your Saved Jobs now

or

find more interesting jobs in

Job Dismissed

Find better matching jobs in

Your search has been saved!

Top 50 Information Security Engineer Skills

Below we've compiled a list of the most important skills for an Information Security Engineer. We ranked the top skills based on the percentage of Information Security Engineer resumes they appeared on. For example, 7.3% of Information Security Engineer resumes contained Vulnerability Assessments as a skill. Let's find out what skills an Information Security Engineer actually needs in order to be successful in the workplace.

These are the most important skills for an Information Security Engineer:

1. Vulnerability Assessments

demand arrow
high Demand
Here's how Vulnerability Assessments is used in Information Security Engineer jobs:
  • Conducted risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs.
  • Participated in Business Unit vulnerability assessments using the security Matrix developed and assisted in the penetration test activities using NESUS.
  • Provided technical engineering support to customers in configuring routers to allow CCAO entry into enclave for vulnerability assessments.
  • Provide extended certification and accreditation support such as conducting risk and vulnerability assessments on each Tactical Network system.
  • Supervised completion of corrective actions resulting from wireless and vulnerability assessments for SOX and PCI compliance audit.
  • Provide weekly, monthly and quarterly vulnerability assessments for all guidance software application and assets.
  • Provided governance over quarterly 3rd party wireless and external vulnerability assessments.
  • Perform vulnerability assessments and identify countermeasures that need to be deployed.
  • Performed security assessments and vulnerability assessments on information systems.
  • Lead over 170 web application security vulnerability assessments.
  • Performed Vulnerability Assessments and Application Penetration Testing.
  • Performed quarterly vulnerability assessments for the Enterprise and worked closely with the NASA customer to analyze results and resolve findings.
  • Consulted clients on proper configurations procedures, which led into penetration testing, vulnerability assessments, and risk assessments.
  • Performed penetration test and vulnerability assessments using Nessus Security scanner.
  • Conduct vulnerability assessments and penetration testing for production, test, and dev environments.
  • Perform network and host vulnerability assessments and work with IT to remediate vulnerabilities.
  • Risk Management and Vulnerability Assessments Installation, Configuration and Maintaining Symantec Endpoint Protection Infrastructure.
  • Scheduled and one-time vulnerability assessments using Nessus, Qualys and Kali Linux.
  • Conduct vulnerability assessments on our software, architecture using Qualys/Nessus.
  • Perform Nessus scans for vulnerability assessments Work with the Executive staff as SME on Security Based projects.

Show More

27 Vulnerability Assessments Jobs

No jobs at selected location

2. Firewall

demand arrow
high Demand
Here's how Firewall is used in Information Security Engineer jobs:
  • Accomplished significant security improvements related to SQL injections, Cross site scripting, anti-spamming, incorporating third party software with firewalls.
  • Engineered and managed clustered firewall configurations and resources to meet the data security needs of the business community.
  • Review Firewall release for any possible non-compliance or vulnerability.
  • Reduced network complexity by decommissioning firewalls, policies, applications, servers, and routers - over 600 devices removed.
  • Conducted the assessment of the current firewall technology and based upon those findings made recommendations for the initial vendor selection.
  • Maintain, operate, support Cisco Firewalls, Cisco ACL's configurations, and administration.
  • Deployed Servers and Firewalls in production Data Centers and managed cabinet clean up.
  • Installed & troubleshot Network Time Protocol (NTP) on Gauntlet firewalls.
  • Track shipping and inventory of firewalls and servers being deployed or stored.
  • Operate 4 barracuda web application firewalls for over 50 domains web security.
  • Developed the strategy for firewall components that would be implemented.
  • Administer and perform Change Management Request on Firewall Rules.
  • Researched ATM firewalls, configured and tested firewalls.
  • Experience on Check Point Firewalls NG, NGX, NGX R65, R70, R75.
  • Monitor Palo Alto firewalls for suspicious activity.
  • Project manager and Team Lead for the Bristol-Myers Squibb Desktop Firewall Initiative * Managed the project from inception thru test pilot.
  • Overhauled proxy architecture, hardware, firewall rulebase, service monitoring, alerting and log retention.
  • Configure Mikrotik wireless routers, Cisco routers, switches, and ASA firewalls.
  • Deploy, Configure, and Manage Cisco and Palo Alto Networks firewalls.
  • Configure and maintain Palto Alto Panorama user for centralized management of the existing Palo Alto firewalls.

Show More

46 Firewall Jobs

No jobs at selected location

3. Ensure Compliance

demand arrow
high Demand
Here's how Ensure Compliance is used in Information Security Engineer jobs:
  • Conducted periodic reviews of SSAA, SeCONOPs and other security documentation to ensure compliance with the accreditation/certification support documentation package.
  • Provide positive control over system configuration, and ensure compliance with operational procedures.
  • Provide physical security addressing threats and vulnerabilities to protect system in SCIF via site survey to ensure compliance with DCID 6/9.
  • Review firewall rule requests to ensure compliance with relevant standards and controls.
  • Utilized Nexpose vulnerability scanning software to ensure compliance objectives are met while providing mitigation strategies and guidance for discovered vulnerabilities.

Show More

4. Information Security

demand arrow
high Demand
Here's how Information Security is used in Information Security Engineer jobs:
  • Conduct or participate in information security posture assessments and develop risk mitigation strategies and provide guidance for securing information systems.
  • Created information security documentation related to work area(s) and completing security requests in accordance with company requirements.
  • Assisted with design and support of the information security database used for day-to-day monitoring and other security-related initiatives.
  • Collaborate with Information Security/Risk Officers to ensure team's Security Plans are accurate and up-to-date.
  • Perform product evaluations and recommend and implement products/services for information security related hardware and software.
  • Provide support for customers and potential customers in the event of information security assessments.
  • Manage, administer, and configure Information Security related systems and applications.
  • Provided strategic guidance on the re-architecture of the information security program.
  • Coordinated information security activities for various programs and environments.
  • Perform independent assessment of clients' information security posture.
  • Supported efforts between Information Security and implementation teams.
  • Provided training and mentoring to information security analysts.
  • Perform information security event analysis.
  • Involved in developing ISS tools for operational use and analyze current threats to information security and systems.
  • Improved and expanded multiple Information Security programs utilizing process and gap analysis, ticketing integration, improved metrics and reporting.
  • Run weekly metrics using Cognos, Access Queries and SharePoint to report to management of Information Security Review.
  • Monitor projects using Plainview and place all evidence of Information Security Reviews in SharePoint.
  • Implemented and maintained information security technical and process controls Developed a Perl script utilizing the Shodan API to discover insecure devices
  • Introduced and implemented an Avocent ACS Console sever for out of band access to crucial network and information security devices.
  • contract) Software Engineer for Information Security Division for Wells Fargo, Inc.

Show More

179 Information Security Jobs

No jobs at selected location

5. Infrastructure

demand arrow
high Demand
Here's how Infrastructure is used in Information Security Engineer jobs:
  • Provide vulnerability assessment for associated infrastructure, network, operational, system & application risks.
  • Helped plan configuration changes for major security infrastructure platforms.
  • Designed and implemented Information Security infrastructure.
  • Monitored AD infrastructure with ManageEngine tools.
  • Bare metal builds of Domain Controllers, Virtual Infrastructures, Exchange Server, Active Directory, and System Center Configuration Manager.
  • Participated in BCP and DR testing/exercises, site power downs, planning, as well as major infrastructure refreshes.
  • Planned, implemented, and managed company-wide SSL digital certificate deployment and centralized solution (PKI infrastructure).
  • Identify vulnerabilities, report findings and countermeasures to the system owner in order to further secure the infrastructure.
  • Maintain integrity of a global IT infrastructure; proactively identify, evaluate, and mitigate security risks/threats.
  • Performed security research, analysis, and design for assigned client computing systems and the network infrastructure.
  • Manage penetration testing to identify weak links in cloud infrastructure and plan remediation efforts.
  • Managed, administered and deployed new Firewall / site Infrastructures.
  • Assisted with the management of PKI infrastructure.
  • Provide Team leadership within the Specialized Security Assessment for the controls assessment of Infrastructure and Global Information Security applications.
  • Analyze and remediate service infrastructure to industry best practices and/or accommodate current enterprise security control standards.
  • Analyzed enterprise architecture views for gaps and redundancies within the Computer Network Defense system infrastructure.
  • Configured Cisco ASA and Check Point firewall layers securing existing datacenter infrastructure.
  • Designed, installed, construct virtualization mirror infrastructure HyperV.
  • Installed DNSSEC, and public key infrastructure (PKI) with configuring multi-factor-authentication for Windows Server 2012 and Linux.
  • Upgraded and migrated from Exchange 2003 to Exchange 2010 in a multi-branch office infrastructure.

Show More

94 Infrastructure Jobs

No jobs at selected location

Job type you want
Full Time
Part Time
Internship
Temporary

6. Security Policies

demand arrow
high Demand
Here's how Security Policies is used in Information Security Engineer jobs:
  • Researched WAF technology limitations and advised development teams on remediation of vulnerabilities not covered by WAF security policies.
  • Maintained networks and computing devices/systems that enforce security policies and audit controls in Windows environment.
  • Developed information security policies, procedures, and security awareness program for data protection.
  • Initiated the assessment and redesign of security policies and awareness training.
  • Developed and maintained security policies, standards and supporting processes.
  • Provide technical support to assess and enforce TSA-mandated security policies.
  • Collaborated in developing corporate security policies, standards and procedures.
  • Created and implemented the information and computer security policies.
  • Provided assistance in implementing security policies and procedures.
  • Drafted security policies: (File Blocking Policy, Firewall Policy, Password Policy, Web-Site Security Policy).
  • Created standards, processes, and procedures for computer systems by adhering to corporate security policies.
  • Ensured that security policies are properly implemented using NIST guidelines and performed auditing of logs.
  • Enforce security policies, directives, and standards at local and client sites.
  • Write and review all security policies, standards, and procedures.
  • Provide technical support to assess security policies, standards and guidelines.
  • Assist with development of security policies, standards and procedures.
  • Developed IT security policies for fortune 1000 companies.
  • Enforce security policies and procedures.
  • Developed and modified Comcast security policies.
  • Develop and publish Information Security policies, procedures, standards and guidelines based on knowledge of best practices and compliance requirements.

Show More

42 Security Policies Jobs

No jobs at selected location

7. Information Technology

demand arrow
high Demand
Here's how Information Technology is used in Information Security Engineer jobs:
  • Conducted technical assessments and evaluated Information Technology initiatives, specifically their impact on security management policies, procedures and standards.
  • Prepare and present detailed briefings to stakeholders providing comprehensive valuations of identified system threats relating to Information Technology Security.
  • Define and implement appropriate security requirements for IT projects Work with information Technology team to produce monthly operational metrics.
  • Perform audit analysis on Dept of State's Information Technology Asset Baseline for application inventory justification.
  • Identify trends on threat organizations, news and information technology using data to investigate.
  • Evaluate all new Information Technology infrastructure projects for security compliance.
  • Identify solutions to new information technology projects.
  • Act as a resource for the university Information Technology teams, providing security guidance and best practices.
  • Evaluate information technology security controls and processes against government regulations to include assessment or certification of technicalconfigurations.
  • EnCase, Forensic Toolkit, and AccessData Familiar with Information Technology Infrastructure Library (ITIL) methodologies.

Show More

20 Information Technology Jobs

No jobs at selected location

8. Windows XP

demand arrow
high Demand
Here's how Windows XP is used in Information Security Engineer jobs:
  • Key member of a project team assigned the mission to convert all desktops to Windows XP and servers to Windows 2000.
  • Design and implementation of Windows XP desktop security policy using Group Policy Object (GPO).

Show More

9. Incident Response

demand arrow
high Demand
Here's how Incident Response is used in Information Security Engineer jobs:
  • Designed and implemented security monitoring and incident response events & activities and provided to management via reports and presentations.
  • Developed and documented the Computer Security Incident Response process using a framework developed by Carnegie Mellon CERT.
  • Participate in Security event analysis and incident response.
  • Developed a tool to collect volatile and non-volatile data remotely on live remote hosts for incident response and root cause analysis.
  • Participated as a member of the corporate computer incident response team and investigated incidents at the corporate and Business Unit level.
  • Demonstrated expert-level knowledge in planning, directing, and managing Computer Incident Response Team (CIRT) operations.
  • Key contributor in the resolution of about 30 cases per week by an incident response team.
  • Work with Data Loss Prevention Incident Response team and Remediation team to fine tune the policies.
  • Authored the AOL Anti-Virus Incident Response process and operations guide customized to the AOL computing environment.
  • Managed process and acted in the lead role for computer security incident response team.
  • Oversee or participate in Incident Response activities, including detection, containment and remediation.
  • Spearheaded creation of techniques, tactics and procedures for incident response handling techniques.
  • Use of industry accepted standards and best practices related to incident response operations.
  • Created initial draft of the network Incident Response Plan (IRP).
  • Designed & lead incident response policy & annual security response exercises.
  • Served as the chair for the security incident response team.
  • Started incident response processes based on NIST 800-61.
  • Assisted in development of Incident Response process.
  • Mentor junior team members on best practices and operational support Overhauled incident response policy for a number of incidents
  • Developed reports for management including remediation plans Digital Forensics / Incident Response - Chief Incident Handler.

Show More

43 Incident Response Jobs

No jobs at selected location

10. Security Audits

demand arrow
high Demand
Here's how Security Audits is used in Information Security Engineer jobs:
  • Conducted security audits to identify potential vulnerabilities related to systems security, application security, or asset protection.
  • Perform high-level Security Audits, compliance, vulnerability management & mitigation, and gap analysis.
  • Perform and create procedures for system security audits, penetration-tests, and vulnerability assessments.
  • Performed quarterly internal security audits and contact of management for course of action.
  • Conducted security audits in accordance with specific government policy guidelines.
  • Perform Physical and Information Security audits tailored around regulatory compliance.
  • Participated in internal security audits and investigations.
  • Participated in successful internal security audits.
  • Participate in Information security audits.
  • Participate in and may lead the technical aspects of internal security audits and investigations.
  • Assist with information system Security audits and reviews; report findings.
  • Performed security audits and implemented solutions for various large UNIX systems.
  • Assisted in IT Security audits.
  • Preform onsite security audits at all branch locations.

Show More

6 Security Audits Jobs

No jobs at selected location

11. Assurance

demand arrow
high Demand
Here's how Assurance is used in Information Security Engineer jobs:
  • Conducted various information security network scans and daily tasks to comply with updates issued for Information Assurance Vulnerability Advisories and Bulletins.
  • Briefed senior operations managers on quality assurance concerns, security implementations, and hardware inventories.
  • Analyzed client's network for access security controls information assurance measures and firewall installation requirements.
  • Conduct information assurance safety briefs to 250+ personnel during annual personnel training.
  • Developed a unique method of denoting differing assurances-level scope for system components.
  • Formulate and develop security plans that are compliant with the information assurance system development life cycle.
  • Manage network assets following DoD Information Assurance Certification and Accreditation Process (DIACAP).
  • Developed testing plans for High Assurance Guards and configured Multilevel Security for B2 systems.
  • Performed daily tasks as directed by the Information Assurance Program Manager and IAM.
  • Develop Information Assurance Certification and Accreditation (C&A) documentation.
  • Understand and apply sound Information Assurance principles and methodology to all work.
  • Work closely with ISSO as part of the Information Assurance Team.
  • Serve as the office information assurance subject matter expert.
  • Completed DoD Information Assurance boot camp.
  • Draft remediation guidance and implement information assurance best practices to restore affected systems.
  • Lead in the performance of onsite technical services for information assurance suite and systems including trouble shooting, repairing and testing.
  • Performed Information Assurance Management (IAM) utilizing Webtrends to report usage violations to management.
  • Maintain DoD 8570.1m compliance in regards to certification for Information Assurance Manager Level 3 work.
  • Provide support to plan, coordinate and implement the organizations information assurance program.
  • Performed Lead Engineer role in an Army Information Information Assurance program.

Show More

9 Assurance Jobs

No jobs at selected location

12. Disa

demand arrow
high Demand
Here's how Disa is used in Information Security Engineer jobs:
  • Initiated enterprise configuration management, disaster planning, capacity management, and network performance measurement, and monitoring and management capabilities.
  • Attend conference for Managed Service Providers channel partners for Business Continuity and Disaster Recovery.
  • Assist Disaster Recovery in identification of IT and security resources which support critical operations.
  • Researched cloud security best practices for implementation of Disaster Recovery solutions.
  • Serve as Network/Security Lead for annual Disaster Recovery event.
  • Reviewed monthly Retina, DISA Gold Disk and SRR scan results and ensured remediation actions were taken to mitigate vulnerabilities.
  • Conduct test and evaluation, risk assessments, and provides recommendations for mitigation of risks in accordance with DISA standards.
  • Worked with DOD sponsors NCIS, JTF-GNO, DISA, and NSA on incident response and forensics analysis efforts.
  • Provide direction to DISA on research, analysis, and design on new DMZ technology.
  • Worked with routers, operational changes, disaster recovery validation, and upgrades.
  • Write up of change in system documentation and disaster recovery processes.
  • Provide Disaster Recovery Plan for multiple USMC / USN Bases.
  • Provide organization SCAP results using DISA SCAP tools.
  • Trained on DISA Assured Compliance Assessment (ACAS 4.8).
  • Provide Information Security Certification and Accreditation Support for applications, systems and networks in accordance with appropriate DOD/DISA/NISTpolicies and processes.
  • Implemented and managed hardware and software environments located in 2 datacenters for Production and Disaster Recovery.
  • Develop contingency plans (Disaster Recovery or Business Continuation Plans for information technology systems.
  • Update and maintain disaster recovery documentation for the Courion systems environment.
  • Performed vulnerability assessments using various security testing tools eEyeRetina, Nessus, and DISA Gold Disk.
  • performed vulnerability assessments and monitored compliance with the DISA STIGs.

Show More

6 Disa Jobs

No jobs at selected location

13. Nist

demand arrow
high Demand
Here's how Nist is used in Information Security Engineer jobs:
  • Generated detailed vulnerability reports to responsible administrators.
  • Created and/or modified necessary AD groups and users to provide security for Application Administrators designs and user-requested security modifications.
  • Implement network modifications and administration including additions, changes, deletions, and configuration of network resources.
  • Evaluate information system for compliance with Federal oversight requirements including NIST 800-53a.
  • Evaluated, recommended, implemented and administrated SAN/Network/Server/firewall/FTP applications.
  • Interviewed System Administrators to determine levels of compliance.
  • Administer and monitor security of administrator accounts.
  • Analyzed and administered IT Security database content, writing end user manual and training on processes as required.
  • Created, Configured and Administered Profiles, Clusters, Nodes and Node Groups for WebSphere Application Server.
  • Network administration, configuration, and troubleshooting network connectivity issues between sites within the WAN.
  • Administered and restricted release of admin and root account highly privileged passwords on Citigroup servers.
  • Produce Standard Operating Procedures Skills Used Documentation for the NIST Guidelines Standards and Operations.
  • Supported the CUID(Customer User ID) and mainframe security administration processes.
  • Conducted user training to ensure systems security and improve overall organization security based on NIST SP.
  • Administered Splunk environment spanning the continental United States.
  • Key Contributions: Migrated 30 customer computer systems from DCID 6/3 to ICD 503 (NIST 800-53 R4) accreditation.
  • Managed and administered the MIT Kerberos 5 infrastructure, created, deleted, modified user and host principals.
  • Group Policies Objects (GPO) National Institute of Standards and Technology (NIST Compliance).
  • Restructured IT Security workflow resulting in a 75% decrease in manual administration.
  • Experience working with syslog configuration and administration with syslog-ng.

Show More

30 Nist Jobs

No jobs at selected location

14. Network Security

demand arrow
high Demand
Here's how Network Security is used in Information Security Engineer jobs:
  • Provided Information Assurance, network security, integration and implementation of computer systems and applications, analyzes and defines security requirements.
  • Performed computer and/or network security vulnerability assessment to identify, evaluate and mitigate security risk, threats and vulnerabilities.
  • Established and maintained processes and models to discover and remedy security incidents detected by network security appliances.
  • Network security monitoring: analysis & identification of incident activities & system log files.
  • Provided technical support and consultation for enhancement of and change to network security configuration.
  • Perform product evaluations, recommend and implement products/services for network security.
  • Operate and maintain network security equipment and implement security solutions.
  • Perform network security design and integration.
  • Developed and enforced network security policies.
  • Research, design, develop and implement monitoring response and administration of a variety of network security and remote access service.
  • Network Security planning, design, and implementation of firewall, switch/router, IDS/IPS, VLAN Configuration, port security.
  • Network Security troubleshooting, configuring, installing and upgrading Checkpoint firewalls on Crossbeam and Cisco ASA firewalls.
  • Manage servers and network security used for day to day operations in compliance with HIPAA.
  • Provided network security related activities to the Office of Secretary of Defense (OSD).
  • Implemented and supported IPS/IDS applications with McAfee Network Security Manager solutions for multiple clients.
  • Assisted network security engineering team by creating firewall rules on CISCO ASA devices.
  • Researched, evaluated, tested, and recommended, network security posture.
  • Managed and engineered the deployment of all network security tools.
  • Provide support for embedded crypto-module design, certification and accreditation processes, network security administration, and security systems design/engineering.
  • Network Security Analysis using Wireshark for deep packet inspection analysis techniques.

Show More

106 Network Security Jobs

No jobs at selected location

15. IDS

demand arrow
average Demand
Here's how IDS is used in Information Security Engineer jobs:
  • Served as a Tier III escalation point for resolution of complex IT problem (Routers/switches firewalls/LAN/WAN/MAN/VLAN/IPS/IDS/Servers, VoIP, etc).
  • Designed and built E Security IDS components, for enterprise protection of 5000 shared and dedicated Unix/Linux/NT web servers and databases.
  • Provided first level Intrusion Detection System (IDS) monitoring, analysis and incident response to information security alerts events.
  • Install and maintain security infrastructure, including IPS, IDS, log management, and security assessment systems.
  • Audit Intrusion Detection and Prevention System (IDS/IPS) logs for anomalies in systems and networks.
  • Managed SIEM infrastructure, IDS and IPS Security Event tuning and noise reduction.
  • Monitor and manage Intrusion Detection and Intrusion Prevention Systems (IDS/IPS).
  • Implemented approved IDS tools on Red Hat Linux standard operating system images.
  • Executed daily reviews of firewall, IDS, and network device logs.
  • Provide support to HelpDesk for locked IDs on the domain.
  • Updated and maintains NIDS and HIDS administration manual documentation.
  • Maintain and implement IDS and IPS systems.
  • Performed IDS signature and software maintenance.
  • Provided Security and Network performance audits periodically using Sourcefire and IDS appliances.
  • Analyzed configuration and implementation of perimeter defense technologies such as firewalls, routing, VPNs, DMZ, and IDS/IPS.
  • Design and Implemented an IDS solution (Lancope) to monitor and perform audit forensic on the network.
  • Managed IDS, anti-virus and anti-malware solutions, SIEM, and Data Loss Prevention tools.
  • Engineer and Administer Servers, Network, Firewall IDS and Load balancer.
  • Monitored and maintained various IDS and antivirus products.
  • Support of IBM/ISS Siteprotector IDS solution.

Show More

16 IDS Jobs

No jobs at selected location

16. Ips

demand arrow
average Demand
Here's how Ips is used in Information Security Engineer jobs:
  • Initiated cross-departmental partnerships with other internal Teams to leverage existing resources and tools and better integrate cross-dependent tasks.
  • Served as the principal information security strategist while maintaining strong relationships with Internal Global Forensics and Disputes functions.
  • Developed and maintain strong client relationships by providing excellent service.
  • Contribute to a monthly newsletter, information security awareness tips.
  • Performed frequent penetration tests remotely to ensure only allowed services are available through our edge devices and test IPS functionally.
  • Established and built relationships with business line management and customers in support of the organization's mission and vision.
  • Served as project leader on the integration of network, security, IDS/IPS feeds into ArcSight.
  • Perform an Initial Security Determination and LC FIPS 199 Security Categorization on IT Systems.
  • Designed & maintained secure file transfer & business relationships with key banks.
  • Manage several Cisco IPS devices installed in sensitive areas throughout the network.
  • Used AT&T IPSEC for dial-in troubleshooting and change controls.
  • Comply with the NIST 18 family controls based on FIPS compliance.
  • Manage filters and rules for anti-virus, IPS and firewall.
  • Defined/tracked 'how to' documents for supported FW/IPS platforms.
  • Provided support for infrastructure FW/IPS platforms.
  • Assisted in security architecture discussions including security control points (NG Firewalls, ACLs, IPS s, etc.)
  • Deploy, manage, maintain, and troubleshoot IBM SiteProtector consoles and Proventia IDS/IPS sensors.
  • Configure IBM proventia IPS to alert and block suspicious packets.
  • Experience configuring and troubleshooting Sourcefire IPS defining the detection engines in in Defense Center used to monitor and log intrusions.
  • Managed security applications such as Proofpoint Email Firewall, MoveitDMZ, Solarwinds Orion, Tippingpoint IPS and Solarwinds LEM.

Show More

68 Ips Jobs

No jobs at selected location

17. PCI DSS

demand arrow
average Demand
Here's how PCI DSS is used in Information Security Engineer jobs:
  • Created and presented to management a comprehensive (~100 pg) PCI DSS recommendation to help bring company further into compliance.
  • Participate and work with external auditors during WebTrust, PCI DSS, TrustE, Safe Harbor compliance activities and audits.
  • Assess networks for PCI DSS compliance.

Show More

11 PCI DSS Jobs

No jobs at selected location

18. System Security

demand arrow
average Demand
Here's how System Security is used in Information Security Engineer jobs:
  • Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  • Performed penetration tests and maintained system security to ensure all new vulnerabilities were addressed.
  • Ensured all information system security-related documentation was current and accessible to properly authorized individuals.
  • Reported information system security incidents to appropriate points of contact.
  • Assist in developing system security configuration guidelines for DCGS-A.
  • Reported directly to the Chief Information Security Officer (CISO) and Information System Security Manager (ISSM).
  • Build relationships with the System Owner, technical staff and other stakeholders and to maintain system security requirements.
  • Assessed the system security categorization as per FIPS 199, identified applicable security controls to NIST 800-53.
  • Manage the Energy Information Technology Services (EITS) information system security officer (ISSO) team.
  • Prepare system security plans, procedures and other artifacts in accordance with company and government standards.
  • Arrange CDC forensic techniques for incident response by utilizing System Security Plan (SSP).
  • Assisted the Business Steward with developing and maintaining System Security Plan (SSP).
  • Perform system security audit for over 400 systems in data center periodically.
  • Developed and maintained DHS's HSDN System Security Plan (SSP).
  • Provided data and system security support for the campus data center.
  • Review and edit System Security Authorization Agreements(SSAA).
  • Conducted system security testing at IRS facilities.
  • Performed IT risk assessment and documented the system security keys controls.
  • Conducted onsite IT system security testing at multiple IRS facilities.
  • Establish system security needs and develop the requirements traceability matrix (RTM).

Show More

21 System Security Jobs

No jobs at selected location

19. Security Assessment

demand arrow
average Demand
Here's how Security Assessment is used in Information Security Engineer jobs:
  • Assist with institutional-wide data classification and security assessments; manage remediation plans in support of risk assessment goals and established guidelines.
  • Perform security assessments, review documentation, and support security analysts in a team of technically diverse personnel.
  • Trained 30+ security engineers on Application Security Assessments, External/Internal Penetration Testing and various other security services.
  • Conduct security assessments and audits to address security findings within the environment.
  • Performed security assessments by verifying/validating connectivity to a commercial client.
  • Coordinate external assessment teams to complete audit and security assessments.
  • Performed mergers and acquisition security assessments and integration activities.
  • Conducted manual and automated security assessment tests and evaluations.
  • Develop application security assessment and risk management programs.
  • Provide support for Continuous Monitoring activities as well as Security Assessment and Authorization (SA&A) activities.
  • Perform Security Assessments, Security Compliance & Standards & Procedures to further enhance our corporate compliance.
  • Developed guidance that improved how HUD's IT security assessments are conducted and reported.
  • Identified as team lead for IT security assessments bureau wide.
  • Completed an enterprise infrastructure and security assessment that resulted in improving public facing security and overall infrastructure creditability.

Show More

14 Security Assessment Jobs

No jobs at selected location

20. DOD

demand arrow
average Demand
Here's how DOD is used in Information Security Engineer jobs:
  • Developed Information Assurance/Security Program documentation leading to Certification and Accreditation for several entities of the Department of Defense (DoD).
  • Provided IA training in accordance with DoDI 8570.01-M and maintained training and certification records for government employees and contractors.
  • Conducted security testing Worldwide to multiple DoD enterprises systems to ensure compliance within all IA security domains.
  • Maintain assets and vulnerabilities in VMS, and complete current DoD STIG checklists for all technologies.
  • Create, test and deploy secure routing environments that meets or exceeds DoD requirements.
  • Assured the Office of Media Sanitation and Data stewardship was compliant with DOD standards.
  • Provided and ensured IA training requirements were met by employees per DoDI 8570-01.
  • Recommended and configured systems to be in compliance with DOD policy and guidelines.
  • Provide security architecture, policy and design guidance for DOD systems and networks.
  • Implemented SCAP scanning in the DoD environment for compliance to STIG requirements.
  • Followed the DoD Information Assurance Certification and Accreditation Process (DIACAP).
  • Perform user manual evaluations based on DoD guidelines.
  • Obtain sign off by the Government client, DoD Contract site on C&A boundary and test plan.
  • Analyze an organizations business process and develop material and non-material solution to implement applicable DoDI 8500.2 IA controls.
  • Served as Lead Information Security Engineer under the PM DoD Biometrics information assurance team.
  • Co-authored a whitepaper, which included an analysis of the DoD CND enterprise architecture for the Chief DoD CND Architect.
  • Assisted with those stakeholders to ensure compliance of DoD directives are met within pre-determined timelines.

Show More

6 DOD Jobs

No jobs at selected location

21. Mcafee

demand arrow
average Demand
Here's how Mcafee is used in Information Security Engineer jobs:
  • Designed and managed McAfee Enterprise Mobility Management console.
  • Reported & analyzed data provided by network scanning tools such as McAfee Vulnerability Manager & QualysGuard.
  • Supported McAfee EPO virus protection central systems for OCTO (15,000+ nodes).
  • Monitor and investigate SOC incidents and alerts with SourceFire and McAfee EPO.
  • Implemented and managed McAfee DLP Data Loss Prevention for site.
  • Managed Anti-Virus systems for site McAfee & F-Secure.
  • Administered McAfee Data Loss Prevention Endpoint / Host.
  • Manage McAfee EPO Endpoint Protection system.
  • Administered McAfee Data Loss Prevention Manager.
  • Deployed McAfee EPO 4.0 product suite to over 9,000 nodes.
  • Set up and evaluated McAfee, ISS, Sygate and Zone Labs firewalls along with the enterprise management components.
  • Deploy, manage, maintain, and troubleshoot Sourcefire and McAfee Network Security Managers and IDS/IPS sensors.
  • Operate and manage McAfee ePO/HBSS on two networks with over 200+ users on each network.
  • Authored several technical knowledge articles to support McAfee products including ePO and Drive Encryption.
  • Implemented and supported security features with McAfee ePO server and agent infrastructure.
  • Manage IDS/IPS (Cisco-Sourcefire, McAfee Nitro).
  • Manage all endpoint security products including Cylance, CB-p, and CB-r along with all McAfee ePO endpoint managed products.
  • Implemented vulnerability assessment scanning at all DHS hospitals using McAfee Foundstone (appliance and scan engine application).
  • Deploy McAfee Solidcore (FIM / Application Whitelisting) in our Data Center and Amazon cloud environments.
  • Worked with Infrastructure Team to evaluate, deploy, and maintain centralized anti-virus solution (McAfee epo, Symantec A/V Corp.

Show More

4 Mcafee Jobs

No jobs at selected location

22. Siem

demand arrow
average Demand
Here's how Siem is used in Information Security Engineer jobs:
  • Evaluated several SIEM products and purchased AlienVault USM as the environments primary security monitoring technology.
  • Utilize SIEM, logging, and packet tracer applications to retrieve correlated and archived information to resolve various incident related tickets.
  • Designed, deployed and managed Accolade's Data Loss Prevention, Web Content Filtering, Vulnerability, and SIEM systems.
  • Review SIEM alerts, perform tuning, daily log review, and monitor threat intelligence providers for actionable information.
  • Worked on securing environment for PCI compliance including installing LogRhythm SIEM, CISCO FirePower IPS.
  • Utilized ArcSight smart connectors to integrate security feeds and construct a robust SIEM infrastructure.
  • Perform tuning of the SIEM filters and correlations to continuously improve monitoring.
  • Implemented ArcSight SIEM, including racking and configuring for the environment.
  • Build security dashboards and reports using SIEM technologies.
  • Implemented ArcSight SIEM and incident response process.
  • Provided complete and detailed descriptions of on-going tasks for the EPA Security Information Management (SIEM) Enterprise Deployment Strategy.
  • Analyzed threats to corporate networks by utilizing SIEM products (Qradar and LogRhythm) to assess the impact on client environments
  • Monitored Security Information and Event Management (SIEM) for security incidents and perform incident response at Unatek.
  • Involved in the initial deployment, day-to-day use and management of the Qradar SIEM.
  • Utilize Splunk as a SIEM to detect network intrusion attempts (security apps).
  • Created trainings for ArcSight SIEM, Blue Coat proxies, Director, and NeXpose.

Show More

72 Siem Jobs

No jobs at selected location

23. Intrusion Detection

demand arrow
average Demand
Here's how Intrusion Detection is used in Information Security Engineer jobs:
  • Worked on a diagnostic system would then help distributed intrusion detection systems to effectively correlate detection reports from various sources.
  • Monitor intrusion detection and prevention systems and determine if security events monitored should be escalated.
  • Monitored security audit and intrusion detection system logs for system and network anomalies.
  • Provided IT security development and management, including intrusion detection and incident resolution.
  • Implemented Personally Identifiable Information (PII) intrusion detection signatures.
  • Possess experience with vulnerability assessment and intrusion detection tools.
  • Monitor and administer internal intrusion detection systems.
  • Managed firewalls and intrusion detection devices.
  • Developed, tested, and operated firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools.
  • Configured the network intrusion detection, Snort, for perimeter and host intrusion detection system on critical servers.
  • Developed and deployed Intrusion Detection Systems (Snort, on Linux) to multiple locations internationally.
  • Monitor and review Intrusion Detection Systems (ISS) and Firewall logs.
  • Supported the Network Team in managing and monitoring of Intrusion Detection System.
  • Implemented Intrusion Detection System for client and trained in-house IT Department.
  • Configure firewalls, intrusion detection systems, and intrusion prevention systems.
  • Created administrative procedures documents for Intrusion Detection Systems (CISCO).
  • Configured, assemble and install Network Intrusion Detection Systems.
  • Network monitoring using real time StealthWatch Intrusion Detection System.
  • Evaluate all new Information Technology projects for security compliance Monitor and review Intrusion Detection Systems (ISS) and Firewall logs.
  • Managed and monitored networking equipment including firewalls, switches, load balancers, and Intrusion Detection Systems.

Show More

46 Intrusion Detection Jobs

No jobs at selected location

24. Nessus

demand arrow
average Demand
Here's how Nessus is used in Information Security Engineer jobs:
  • Perform physical site assessments and vulnerability analysis using approved scanning tools such as Nessus, Retina or FoundStone.
  • Performed network and application level penetration testing and vulnerability scanning using MetaSploit and Nessus.
  • Assess risk factors and advise on vulnerability to attacks from Retina, Nessus, ACAS, and Burp Suite.
  • Reported machine migration and patch status of all HHS machines connected to the domain using Nessus SecurityCenter.
  • Conducted FISMA vulnerability scanning and analysis using tools such as Nessus, AppDetective, and WebInspect.
  • Update scan engines, audit files and install Nessus and ACAS Plugins.
  • Perform network vulnerability scans with Retina, Nessus and ACAS.
  • Administer and maintain campus Nessus scanners.
  • Assist in the collection of monthly metrics and analytics data for CISO based on various sources, primarily Nessus vulnerability scans.
  • Supported the tools for incident response, Symantec Endpoint Protection, Nessus and Fortify scanning tool.
  • Perform security assessment and vulnerability scanning using MVM, Qulays, Nessus, and CoreImpact.
  • Perform vulnerability analysis, penetration testing (nmap, Nessus, customized test tools).
  • Provide vulnerability assessment using BigFix, Nessus, DBProtect, and ISS scanner.
  • Created audit reports using Rapid 7 Nexpose and Tenable Nessus applications.
  • Analyze and remediate STIG and Nessus scan findings.
  • Deployed and maintained network vulnerability scanners (Nessus and Nexpose) and port scanners (Nmap).

Show More

19 Nessus Jobs

No jobs at selected location

25. VPN

demand arrow
average Demand
Here's how VPN is used in Information Security Engineer jobs:
  • Managed vendor relations for VPN connectivity.
  • Secure configuration and administration of Cisco ASA firewalls, VPN's, routers, switches and wireless infrastructure.
  • Manage VPN access, encryption, assist with day to day active directory set-up and troubleshooting.
  • Validate and correct NTFS permissions across the environment, Juniper SRX/ISA, VPN access.
  • Provide 24/7 support for all firewall, VPN, and access control systems.
  • Coordinated local, vendor and third party resources to connect new VPN partners.
  • Worked on Cisco ACS 5.2.0.26.5 for creating new VPN accounts.
  • Configure and troubleshoot VPN's on infrastructure VPN devices.
  • Managed Cisco ACS VPN appliance.
  • Install, configure and administer RSA for VPN two-factor authentication and Nortel for VPN connection to USA head office.
  • Support VPN Solutions on Nortel Connectivity (IPSEC) and SSL (F5) and other VPN devices.
  • Implemented Juniper Secure Access 6500 FIPS SSL VPN Cluster to replace outdated Secure Nomadic Access.
  • Project-managed migration of 300 VPN tunnels to new data center within timeline and budget.
  • Design and engineer site-to-site VPN, Remote Access, and IPSec VPN on Firewall.
  • Control network access using site-to-site and remote-access VPN, corporate Wi-Fi, RADIUS authentication.
  • Developed multi-office VPN backbone with traffic shaping and advertized routing.
  • Evaluate and recommend new VPN solutions Integrate Trend Micro Anti-Virus into customer LAN/WAN environments Experience with Raptor and Cisco Pix.
  • Provided administration and operational changes to Cisco DMVPN, Check Point, Sophos, Astaro, and F5.
  • Implemented and managed Cisco 3005 Concentrators for remote users and site-to-site VPNs to our customers and vendors.
  • Designed and deployed User access VPNs using Cisco VPN Clients, Anyconnect VPN, ArubA RAP, Cisco SSL VPN.

Show More

5 VPN Jobs

No jobs at selected location

26. Active Directory

demand arrow
average Demand
Here's how Active Directory is used in Information Security Engineer jobs:
  • Developed the company's Active Directory security event monitoring standard.
  • Performed day-to-day creation and maintenance of Active Directory accounts.
  • Managed Microsoft Active Directory (AD) Organizational Units (OU), objects, policies, users and groups.
  • Developed a process, along with forms, to request the creation of select Active Directory users and groups.
  • Configured and added new domain controllers and objects to existing trees within an Active Directory (AD) forest.
  • Provided consultation to the company on Active Directory and Group Policy design, security, and application integration.
  • Provisioned users across multiple domains and platforms such as Active Directory, Unix/Linux, and LDAP.
  • Used active directory and group policy to manage applications, accounts and containers for secure environment.
  • Developed the company's Roles and Responsibilities (RACI) model for Active Directory.
  • Added new domains and configured the domain rules for the Active Directory and LDAP.
  • Create and manage user accounts in Active Directory and Exchange server.
  • Developed the company's Active Directory User and Group standard.
  • Administer and maintain user's access to applications Active Directory.
  • Manage the Reserve Bank Active Directory infrastructure.
  • Experience in Handling Active Directory.
  • Configured and maintained LDAPs communications between Linux systems and Center-wide Microsoft Active Directory Domain services for center-wide users.
  • Deployed and manage the Wachovia Bank Microsoft CA (2003) solution for Active Directory integration within the enterprise.
  • Used Microsoft Project, Microsoft Office, Symantec Discovery, Active Directory.
  • Provided support for Microsoft Active Directory, VMWare and Linux.
  • Used Active Directory, and Citrix to manage domains.

Show More

4 Active Directory Jobs

No jobs at selected location

27. Endpoint

demand arrow
average Demand
Here's how Endpoint is used in Information Security Engineer jobs:
  • Maintain endpoint security with anti-virus, URL filtering, application control, vulnerability management, and patch management.
  • Mitigate the business risk by designing and implementing security solutions at applications, perimeter and endpoint device.
  • Implemented a managed endpoint encryption solution utilizing TrendMicro MobileArmor to secure university workstations against sensitive data loss.
  • Lead information security system infrastructure and endpoint encryption client application upgrades.
  • Lead subject matter experts on endpoint security application delivery.
  • Customized policies were implemented to enforce McAfee Endpoint HBSS.
  • Manage endpoint, email and web gateway security products.
  • Manage the secure messaging and endpoint encryption infrastructure.
  • Led the Security Department in investigating suspicious network and endpoint activity.
  • Manage a team of highly skilled engineers in the cryptographic field ranging from PKI, RSA SecurID to endpoint encryption protection.
  • Led an Enterprise roll-out of Symantec DLP Endpoint to Windows 7 machines and built and stood up 3 EndpointServers.
  • Administer Sophos Anti virus console in use for endpoint protection.
  • Designed/configured Websense DLP (Network and Endpoint).
  • Named North American lead for Symantec Endpoint Protection and Symantec Data Loss Prevention (email, web and endpoint).
  • Architected, deployed, upgraded and maintained Check Point's Encryption Software to over 300,000 endpoints through out many customers.
  • Utilized Symantec Endpoint Protection Manager in combination with IPs from Blue Coat Reporter to identify users.
  • Lead Engineer for Enterprise Scale Symantec Endpoint Protection managing [ ] users.

Show More

28. Linux

demand arrow
average Demand
Here's how Linux is used in Information Security Engineer jobs:
  • Demonstrated excellent skills in performing operating system hardening of Windows and Linux along with their applications.
  • Managed, maintained and serviced Linux/Windows based network.
  • Performed risk analysis and penetration testing on for over 500 Linux, Windows, network and virtual assets.
  • Designed and implemented a 135 seat call center in Mexico using all Open Source/Linux based systems.
  • Assessed technical controls on Oracle database, Red Hat Linux, and other system components.
  • Manage and maintain over 100 Linux based mail logging systems all locations in America.
  • Perform OS hardening for various Windows and Linux based servers.
  • Provide multiple layers of Linux/UNIX log analysis to customers.
  • Maintain RedHat Enterprise Linux servers.
  • Experience in installing, upgrading, and maintaining Solaris/HP-UX/Linux/AIX based solution environment with cluster setups.
  • Provided primary systems administration functions for internal and external Red Hat Linux servers.
  • Trouble shooting complex issues and problems on Solaris/HP-UX/Linux/AIX based solution environments.
  • Installed, configured and maintained VMware Linux systems, LDAP server, repository servers and applications security plans and server configuration.
  • Installed and maintained UNIX, Linux and W indows servers in an environment with over 35 servers that was NASA wide.
  • Migrated cisco access control system cluster from windows platform to Linux.
  • Configure and Maintain Linux Splunk Enterprise deployment.
  • Analyzed malware via malware reconstruction using Linux to determine direct threats to client organization.
  • Designed, implemented, and supported early warning Snort IDS/Aanval architecture running Red Hat Enterprise Linux 4 and VMWare Workstation/ESX Server.
  • Utilized VMware Workstation to simulate Windows 2003 Server, Windows 2000 Professional, SuSE 9.1, and Redhat 9.0 Linux.
  • Install Linux with sendmail and configure webmail for customer.

Show More

12 Linux Jobs

No jobs at selected location

29. Security Tools

demand arrow
average Demand
Here's how Security Tools is used in Information Security Engineer jobs:
  • Concluded an efficiency study on all security tools and renegotiated licensing terms to lower current capital spending whenever possible.
  • Evaluate customers' networks for best possible placement and utilization of security tools they purchased, like network based Intrusion Detection.
  • Provided training and written documentation of all security tools and procedures for analysts to monitor network traffic and firewall logs.
  • Researched vulnerabilities, exploit code, and security tools in order to implement stronger controls and processes.
  • Incorporate a variety of open-source security tools, such as Snort NIDS, Bro and Barnyard.
  • Author and review standard operating procedures for security tools, software, and hardware.
  • Conducted training to junior and senior engineers on using GAO's security tools.
  • Improved company's overall security by using cutting edge security tools and techniques.
  • Leverage Security Tools and Compliance experience to engineer and manage IT security services.
  • Led the development of the Standard Operating Procedures for the Security tools.
  • Utilize security tools such as nmap, port scanners, and sniffers to troubleshoot connectivity and security issues.
  • Ensured that server security tools, configurations, and security GPOs were configured and operating correctly.
  • Tune rules for security tools such as Splunk, Snort, Symantec DLP, and Akamai WAF.

Show More

30. Risk Assessments

demand arrow
low Demand
Here's how Risk Assessments is used in Information Security Engineer jobs:
  • Provide risk assessments to ensure new or existing technology implementations minimize risk to patient care and critical infrastructure.
  • Perform security risk assessments, security consultation, penetration testing, web application scanning, vulnerability scanning !!
  • Performed statistical analysis of Security Reports for risk assessments, vulnerability assessment.
  • Develop risk assessments and prepare all associated documentation during DIACAP process.
  • Collaborated with internal and external departments to perform risk assessments.
  • Analyzed and mitigated vulnerabilities concerning network risk assessments.
  • Evaluate security risk assessments and engineering change proposals.
  • Participated in information security risk assessments.
  • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures.
  • Implemented risk management program, analyzed business risk on all new and existing systems and projects by performing risk assessments.
  • Perform IA testing, develop risk assessments, perform threat analyses, and manage initial and subsequently identified risks.
  • Create Security Risk Assessments for contracted solutions and provide Contract Management the assessments to make appropriate contract decisions.
  • Served as technical liaison for Global risk assessments in an FDA regulated environment.
  • Attended to all Application Risk Assessments meetings where Application security is pertinent.
  • Determine when risk assessments are required for production requests.
  • Led and performed security risk assessments.
  • Perform security risk assessments of holistic controls to limit the exposure and impact to Wells Fargo Bank from cyber security threats.
  • Perform risk assessments during the acquisition of product and/or services to ensure compliance with proper laws and/or regulations (e.g.
  • Perform risk assessments and analyses of applications for Qwest and its customers.
  • Participate in risk assessments, penetration tests and help diagnose internet/extranet security, intrusion attempts, and cyber-crime response.

Show More

9 Risk Assessments Jobs

No jobs at selected location

31. Security Requirements

demand arrow
low Demand
Here's how Security Requirements is used in Information Security Engineer jobs:
  • Conducted inspection after construction of OSA ensured DOJ and Department of Defense security requirements was met prior to processing classified information.
  • Fostered relationships with development and technology teams to determine if additional Security requirements are needed during deployment of application projects.
  • Provide information security leadership to develop strategies and plans to enforce security requirements, identify and address risks.
  • Project support: providing security requirements to project teams; assisting projects with go-to-production processes and operational acceptance.
  • Validated and verified system security requirements definitions and analysis and establishes system security designs.
  • Experience analyzing network configurations to ensure that it meets information security requirements.
  • Collected, analyzed, and documented the directory and security requirements.
  • Provide strategies for sustaining the security requirements of an information asset.
  • Collaborate with cross-functional teams and executive stakeholders to develop Security requirements.
  • Evaluate industry best practices relative to PenFed security requirements.
  • Implemented event correlation rule logic for general security requirements.
  • Analyze given system or network, document its security features, and describe how those features address applicable security requirements.
  • Determine baseline IT Security Requirements for IT Systems.
  • Architected, designed and implemented Security requirements for a new remote data center.

Show More

31 Security Requirements Jobs

No jobs at selected location

32. Internet

demand arrow
low Demand
Here's how Internet is used in Information Security Engineer jobs:
  • Configure internet proxy server to restrict corporate internet access to support company's acceptable use policy.
  • Facilitated corporate Security Awareness program in regard to professional and personal Internet safety.
  • Developed corporate policies and procedures governing corporate security, email and Internet usage, access control, and incident response.
  • Enhanced IS security by establishing internet operations, services, firewalls, VPN, and intrusion detection system.
  • Administered Cisco 3550s for Internet connectivity and 6509 and 6513 for our core network all using TACACS+ authentication.
  • Lead support for ZixMail email encryption software used to securely transmit data to Internet-based users.
  • Designed and operated Internet FTP server solution for over 100 unique users & services.
  • Work with messaging team to implement email disclaimer on all outgoing internet email.
  • Worked closely with contractors, vendors, and internet service providers.
  • Project Lead of email disclaimer for all internet email.
  • Conduct vulnerability scans of internal and internet-facing hosts and remediate deficiencies.
  • Assessed, recommended and implemented products/services updates with regards to the IBM Internet Security Systems, Sourcefire and other systems.
  • Participate in Websense design discussions to secure Internet ingress points in Emerson Global Data Centers.
  • Carry out firewall access list request for both the Internet and Extranet environments.
  • Deployed bluecoat ProsySG and Proxy AV for internet content filtering.
  • Support the corporate internet infrastructure composed of several Bluecoat ProxySG devices.
  • Performed InfoSec analysis for several enterprise (Internet) Service Oriented Architectures (SOAs).

Show More

10 Internet Jobs

No jobs at selected location

33. Security Solutions

demand arrow
low Demand
Here's how Security Solutions is used in Information Security Engineer jobs:
  • Develop and implement global security solutions to meet business requirements while balancing acceptable risk to the company's client information assets.
  • Review contract specifications and implement security solutions for small to midsize financial institutions that meet client needs.
  • Provided security solutions and interpretations of organization security policies as they relate to specific architects and projects.
  • Delivered comprehensive security solutions and tools to meet dynamically changing requirements by evaluating and leveraging emerging technologies.
  • Prepared monthly security reports, wrote security solutions manuscripts, and trained staff on security solutions.
  • Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.
  • Maintain operational configurations of all in-place security solutions as per the established baselines.
  • Assist the information Security team in identifying security risks and implement security solutions.
  • Provide Global engineering support for cloud-based identity security solutions and Enhanced Authentication services.
  • Monitor all in-place security solutions for efficient and appropriate operations.
  • Design and deploy security solutions with complex network architecture.
  • Develop and propagate security solutions and administration.
  • Engineer and maintain Information Security solutions.
  • Administer the State of Missouri's network, endpoint, and cloud security solutions.
  • Build and configure security solutions and lead migration efforts to ensure smooth operation.
  • Design, implement, and maintain network and infrastructure security solutions.
  • Design, implement, document, and operationalize varying security solutions.
  • Key Achievements: * Utilized cutting-edge methods, trends, and techniques to deliver IT security solutions.
  • Architected intrusion detection and prevention (IDS/IPS) security solutions for all clients which provided network protection and met regulatory compliances.
  • Implement and administer security solutions and technologies in a multi-site, 25,000 user HIPAA regulated Healthcare System.

Show More

66 Security Solutions Jobs

No jobs at selected location

34. Fisma

demand arrow
low Demand
Here's how Fisma is used in Information Security Engineer jobs:
  • Experienced working with FISMA, Computer Security Act and other federal regulations related to information security.
  • Assist the Section Chief and the Branch Manager in the day to day execution of the TSA FISMA Compliance program.
  • Led the certification and accreditation efforts by implementing NIST 800-53 security controls in order to obtain FISMA compliance.
  • Work as a team lead for FISMA Security Authorization of new system deployment for HHS OIG.
  • Network & systems auditing; effectively securing the network infrastructure for FISMA Certification & Accreditation.
  • Research the major obstacles related to DHS ever-changing FISMA requirements.
  • Insured that systems were fully FISMA compliant.
  • Prepare Security documentation for SSAA, DITSCAP, NIACAP, FISMA and NIST compliance for Qwest customers.

Show More

13 Fisma Jobs

No jobs at selected location

35. Diacap

demand arrow
low Demand
Here's how Diacap is used in Information Security Engineer jobs:
  • Managed development of DITSCAP and DIACAP Accreditation packages for 25 Naval Education and Training Command learning sites.
  • Key Contributions: Develop DITSCAP and/or DIACAP documentation such as the Core SSAA documents and its appendices.
  • Develop or completed IS/N documentations to support an IATO under DIACAP, when none were available.
  • Developed secure (digitally signed) templates for DIACAP documents using Adobe.
  • Managed T-SCIF and DIACAP required paperwork for 10 affiliated systems.
  • Identify the activities within each phase of the DIACAP/NIACAP/NIST processes.
  • Perform DIACAP and Risk Management Framework assessment activities.
  • Key Contributions: Develop DIACAP documentation.
  • Identify the phases of the DIACAP/NIACAP/NIST processes.
  • Key Accomplishments: Completed submission of 8 DIACAP packages, each receiving a 3-year ATO.

Show More

1 Diacap Jobs

No jobs at selected location

36. RSA

demand arrow
low Demand
Here's how RSA is used in Information Security Engineer jobs:
  • Installed and configured Universal Forwarders.
  • Deploy UKM (Universal Key manager Tool) in the DEV/UAT Environment and deploying, back-ends as needed for the region.
  • Support Identity and Access Management solutions such as RSA SecurID, UniCERT managed PKI, and Federal/Commercial digital signing services.
  • Worked with RSA to document, resolve, and test bugs or issues with the software.
  • Managed, maintained, monitored, and oversaw upgrade deployment of Tenable SecurityCenter and virtual scanners.
  • Key Achievements: * Implemented both RSA envision and RSA two-factor Authentication for financial sector.
  • Administer, merge, and migrate Strong authentication via RSA SecurID and Cisco ACS products.
  • Use RSA envision to collect and analyze firewall logs.
  • Perform administration of RSA/ACE Servers running on Windows Platform.
  • Monitored intrusions attempts utilizing RSA's Security Analytics tools and created business impact reports.
  • Designed and oversaw the vulnerability assessment and Web Application Scanning program utilizing Qualys.
  • Developed the dashboards for platform components, configured and deployed Splunk components (Universal/Heavy Forwarders, Indexers etc.)
  • Managed the rollout of PGP universal Server to provide public/private key encryption functionality to the business unit.
  • Utilized RSA enVision for auditing, reporting, and storage of all logs.
  • Implemented two factor RSA authentication on all Wintel Servers.
  • Deployed and managed RSA enVision systems.
  • Created exception-specific policies to migrate from a universal whitelist to a granular ruleset, with access granted on an as-needed basis.
  • Designed and implemented an RSA multifactor authentication PoC (proof of concept ) for use with the PCI environment.
  • Developed and installed new RSA Keon CA solution for SSLCA (Valicert Root External SSL).
  • Gathered evidence for PCI systems including RSA and nuBridges Tokenization services.

Show More

37. Security Incidents

demand arrow
low Demand
Here's how Security Incidents is used in Information Security Engineer jobs:
  • Provided day to day operational support to resolve remedy tickets related to security incidents.
  • Responded to security incidents assigned, investigated security incidents based on severity and procedures.
  • Identify patterns of compromises of security incidents and perform forensic analysis.
  • Provided practical knowledge of security incidents and security violations to custodians.
  • Responded to security incidents and emergencies involving viruses and intrusions.
  • Prepare and present evaluation reports regarding security incidents.
  • Identify security incidents and perform the PICERL methodology.
  • Investigated security incidents as needed.
  • Work as part of the incident response team to quickly and effectively apply remediation tasks to security incidents.
  • Handle and coordinate computer security incidents as part of the Computer Security Incident Response Team (CSIRT).
  • Provided proper guidance and procedures in reporting security incidents to custodians on a daily bases.
  • Respond to, investigate and report all IT Security and physical security incidents.
  • Assist with security incidents and provide digital forensic analysis as required by ISO.
  • Follow up of security incidents from various stakeholders of the respective devices involved.
  • Audit / investigate all network / host security incidents that occur.
  • Respond to, investigate, document and rectify security incidents.
  • Developed and implemented standard operating procedures for handling security incidents involving malware delivery.
  • Triaged, managed, and documented details of security incidents using BMC Remedy ticketing system.

Show More

56 Security Incidents Jobs

No jobs at selected location

38. Access Control

demand arrow
low Demand
Here's how Access Control is used in Information Security Engineer jobs:
  • Experienced in access control security testing.
  • Administered physical access control system.
  • Design, implement and support multiple Juniper SSL VPN sites including updates, access control, and troubleshooting end user issues.
  • Managed requests for Web and multimedia content, providing advance content filtering services and access control.
  • Provided senior technical support to both in-house staff and client for encryption and access control applications.
  • Performed backup role for Oracle (11g) application tier authorization and access control.
  • Assess the strength of identification/authentication, audit, and access control functions.
  • Oversee all audits including Sarbanes-Oxley, general computing controls and access controls.
  • Network Access Control using Cisco Secure ACS and Application Access Provisioning.
  • Maintain the responsibilities and duties of an Access Control Administrator.
  • Manage access control to security infrastructure using Cisco ACS.
  • Research, implement and test access controlidentity management and single sign-on solutions for enterprise-wide applications.
  • Analzyed employee roles/responsibilities to determine appropriate access control for company applications based on management requests.
  • Access Control Lead Propose process improvements to our clients to streamline our efforts and reduce inefficiencies.

Show More

2 Access Control Jobs

No jobs at selected location

39. Security Posture

demand arrow
low Demand
Here's how Security Posture is used in Information Security Engineer jobs:
  • Researched and evaluated emerging security trends and issues to assist customers in improving the security posture of each organization.
  • Researched current security trends and conduct technology forecasts, and perform gap analysis against current security posture.
  • Prepare reports and documentation of vulnerabilities discovered to improve overall security posture of organizations.
  • Assisted in any capacity necessary to enhance the overall security posture of Global Payments.
  • Recommend remediation actions for compliance and an improved security posture.
  • Review and provide expertise on security posture of C&A documentation regarding a general support system and a major application.
  • Conduct assessments of target machines and complete networks to analyze their overall security posture.
  • Provide technical support for activities that improve security posture of company's networks.
  • Engineer and implement solutions to improve security posture for clients.
  • Represented IA in Configuration Management meetings and provided feedback as it related to possible triggers to the systems security posture.
  • Suggested ways to improvesecurity posture by altering configurations and adding security appliances, including working withvendors to obtain quotes.

Show More

32 Security Posture Jobs

No jobs at selected location

40. SOX

demand arrow
low Demand
Here's how SOX is used in Information Security Engineer jobs:
  • Provided evidence reporting for Internal Auditors regarding SOX compliance including process and procedure flows and adherence to change management.
  • Used PCI and SOX auditing system to test for any exposed vulnerability and reviewed and filed exceptions for all potential vulnerabilities.
  • Provide guidance for SOX compliance, risk, and worked in the development of the information systems security policies.
  • Worked closely and assisted external IT Auditors during SAS 70, ISO 17799, and SOX audits.
  • Provided governance assistance in areas of compliance such as HIPAA, PCI, and SOX.
  • Worked on PCI and SOX security baseline support and as Information Security Professional.
  • Performed SOX compliance testing and maintenance, and yearly audits and certifications.
  • Work with an external auditor to address SOX IT General Control gaps.
  • Ensured IT SOX compliance on all SOX related systems.
  • Assisted in preparation of SOX audits.
  • Sound understanding of PCI and SOX compliance
  • Participated in annual SOX audit.
  • Assisted Compliance group in areas of SOX, PCI, and HIPPA.
  • Contracted to help address SOx/SOC1 compliance and reporting, process controls updates and other information risk management and security compliance activities.
  • Helped socialize corporate internal control objectives through ongoing communication to key IT stakeholders via newsletters and IT SOx Summits.
  • Coordinated external SOX, ISO27001, BS25999, and customer audits of Mahindra Satyam's networks and systems.

Show More

41. Unix

demand arrow
low Demand
Here's how Unix is used in Information Security Engineer jobs:
  • Facilitated forensic investigations of compromised and/or exploited servers through knowledge of file systems of Windows- and UNIX-based operating systems.
  • Conduct Samba security administration on IBM UNIX systems for application developers and contractors.
  • Provided security management, guidance, and technical support for Unix, NT, network devices and anti-virus.
  • Acted as domain expert for all Unix, security, and networking technical support issues requiring escalation.
  • Planned, developed, deployed and maintained small, medium, and large Windows and UNIX networks.
  • Design, configuration, and build-out of large UNIX servers, including HP and SUN architectures.
  • Managed Checkpoint Firewall Change Controls and reviewed logs for Unix and Windows Servers.
  • Involved in migration of SUDO to Power broker application in UNIX environment.
  • Performed monthly vulnerability scans and reports of all Windows and Unix servers.
  • Transfer certification is updated and modified on a UNIX based platform.
  • Executed SRR security scans on SUN SOLARIS UNIX, HP-UX UNIX, WINDOWS NT and WINDOWS 2000 systems.
  • Assess host security of Unix and Windows NT hosts using Axent's Enterprise Security Manager, and Net Recon.
  • Designed network/business analytics (extract/transform/load) using Python, Unix scripting, and Regular Expressions.
  • Work with Windows, UNIX and Middleware teams to plan test and install patches across multiple dev/test/prod environments.

Show More

3 Unix Jobs

No jobs at selected location

42. Checkpoint

demand arrow
low Demand
Here's how Checkpoint is used in Information Security Engineer jobs:
  • Develop and implement applicable standards for security checkpoints & encryption methods.
  • Engineered the migration of Checkpoint management servers to Provider-1/SiteManager.
  • Designed and deployed a VPN mesh across the Internet between corporate partners for a financial billing system using Checkpoint Firewalls.
  • Upgraded Checkpoint from Version R75.40 to R77.10 on Crossbeam and performed policy pushes during scheduled change windows.
  • Leveraged Checkpoint Provider-1 to manage global policies and global VPN, while effectively monitoring status.
  • Participated in the migration of Checkpoint UTM/firewall appliances from version R55 to R65.
  • Managed Firewall products - Checkpoint Appliance 2200 Gateways, Provider-1 and VSX environment.
  • Conduct manual tests in QA environment to ensure CheckPoint functions as designed.
  • Designed and deployed NGX R65 on all enterprise Checkpoint firewalls.
  • Designed redundant checkpoint SSL Extender for remote access users.
  • Install, Configure and manage Firewalls (Cisco PIX/ASA, Checkpoint, Palo Alto, and Juniper).
  • Configure, deploy, and manage Cisco PIX, Snapgear, and Checkpoint Firewalls.
  • Maintain existing security environments to include IDS/IPS (Checkpoint and Dell Secureworks).
  • Specialized in Checkpoint firewall and Iboss Secure Web Gateway solutions.
  • Installed, configured and deployed CheckPoint Firewall-1 on UNIX and Nokia which provided stateful packet filtering between trusted and untrusted environments.
  • Maintained a multi-tier, multi-location Checkpoint firewall infrastructure in accordance with NERC-CIP, HIPPA, SOX, and NIST guidelines.
  • Key Technologies: Cisco Guard, Arbor Peakflow, Cisco PIX and ASA, Checkpoint Firewall 1, and Snapgear
  • Designated Engineer for high severity tickets (Enterprise impacting) involving Symantec Endpoint Protection, Websense and CheckPoint PointSec.
  • Specialized in LAN/WAN security using the firewalls: Checkpoint Firewall-1, Netscreen, and Watchguard.
  • Deployed the migration of checkpoint Win 2003 FWs to Resilience Linux based FWs.

Show More

1 Checkpoint Jobs

No jobs at selected location

43. Disk

demand arrow
low Demand
Here's how Disk is used in Information Security Engineer jobs:
  • Assisted SOC engineers in identifying system and network requirements such as disk space, firewall ports and bandwidth utilization.
  • Write and execute detailed QA test scripts for new Check Point Full Disk and Media Encryption products.
  • Analyzed and deployed an enterprise-wide full disk encryption solution for PCI compliance.
  • Developed test strategies and procedures and tested update and image disks.
  • Designed a build configuration to mitigate the majority of the risks, including GPOs, disk encryption and authentication monitoring.
  • Supported hard disk encryption systems, anti-malware systems, and PKI infrastructure for digital certificates.
  • Pulled full disk machine images over the network using FTK and filesystem audits with Mandiant.
  • Lead engineer for the Whole Disk Encryption (WDE) project at Qualcomm.

Show More

44. SQL

demand arrow
low Demand
Here's how SQL is used in Information Security Engineer jobs:
  • Installed SQL Server 2012 Enterprise with Developer Extensions.
  • Supported AD/PDC/BDC, Print, Application, SMS 2.0, SQL, EPO Virus Protection, and GIS servers.
  • Manage, DNS, DHCP, WSUS, IIS, SQL Server and IIS for customer facing data center.
  • Write SQL related procedures (SSI's Pkg.)
  • Evaluated vulnerabilities in the existing Web environment and addressed ongoing SQLi attacks.
  • Test SQL environment patches and (SSIS) service packs for delivery into Courion's cloud environment.
  • Worked as an ISA, Exchange, SQL, IIS, LCS and Citrix Administrator.
  • Deployed custom configurations of the QRadar appliance via development of backend SQL queries for custom reporting and logging.
  • Monitored and performed troubleshooting of Oracle, SQL and Sybase databases with the Imperva Infosphere Security application.

Show More

45. Retina

demand arrow
low Demand
Here's how Retina is used in Information Security Engineer jobs:
  • Developed and maintained procedures and checklist in support of REM/Retina vulnerability scanning activities.
  • Developed REM/Retina vulnerability scanning JQS.
  • Performed security scans and audit work using the following tools: Retina, Gold Disk, and DIACAP Audit Guidelines.
  • Conducted IAVA Scans using Security Threat Avoidance Technology (STAT), Retina Network Security Scanner.
  • Work with System Administrators to mitigate any weekly IAVA findings from the Retina scans.
  • Conduct weekly vulnerability scans on multiple networks using Beyond Trust Retina software.
  • Managed multiple Retina Scanners using eEye REM Security Management Console.
  • Performed vulnerability scans using eEye Retina Scanner.
  • Experience with E-eye Retina Scans and mitigations
  • Performed department vulnerability scans using Retina, Nesses and Nmap.

Show More

1 Retina Jobs

No jobs at selected location

46. DLP

demand arrow
low Demand
Here's how DLP is used in Information Security Engineer jobs:
  • Performed DLP server scanning-analysis of PCI/PHI data resting on hospital servers and reported findings to the risk assessment group.
  • Performed forensic acquisitions of data using FTK Forensic Software and enforce DLP in an enterprise environment.
  • Worked with my team to upgrade the network DLP infrastructure to the latest version.
  • Assist in day-to-day DLP and Data Insight business activities.
  • Discover and remediate PII on critical databases and workstations utilizing IdentityFinder DLP to ensure the integrity of sensitive data.
  • Administered the enterprise deployment and configuration of Symantec DLP.
  • Manage and maintain Firewalls, IDPs, HIDS, SEP, DLP and Log Collection Platforms for global customers.
  • Processed weekly DLP statistical reports on website scanning, blocked-encrypted outbound emails, and antivirus-spam.
  • Experience with Symantec DLP web security gateway to provide security for outbound web content.
  • Integrated Cipher Cloud with Symantec DLP Web Prevent component.
  • Coordinate enterprise wide DLP End Point Agent deployments- including one- off and specialty devices( e.g.
  • Provide onsite Symantec DLP technical service and support to a Large Enterprise customer base.
  • Upgraded the infrastructure from Symantec DLP 12.5 to Symantec DLP 14.0 Change and Incident Management using HP Service Manager.

Show More

47. Security Issues

demand arrow
low Demand
Here's how Security Issues is used in Information Security Engineer jobs:
  • Consulted with project managers and developers on information security issues for individual projects and hosted information systems.
  • Monitored vulnerability and patch management levels and advised on information security issues related to systems.
  • Advised the DOJ CIO on IT security issues, including requests from components for waivers from DOJ IT security policy.
  • Work directly with vendors, developers, and Data Base Administrators to identify, report or resolve any security issues.
  • Evaluate the impact of security issues with respect to the NIH mission and prioritize remediation efforts based on risk.
  • Collaborate on critical IT projects to ensure that security issues are addressed throughout the project life cycle.
  • Assess threats, risks, and vulnerabilities from emerging security issues formulating and implementing corrective actions.
  • Review Security Plans, TFM, SRTM, SFUG for DHS for security issues or concerns.
  • Communicate security issues to system administrators and follow up to ensure issues are brought to closure.
  • Perform advanced troubleshooting of network and security issues via raw packet analysis on multiple networks.
  • Charged with identifying and resolving critical security issues in both the US and abroad.
  • Coordinate, measure and report on information security issues related to business processes.
  • Assess threats, risks, and vulnerabilities from emerging security issues.
  • Handled technical security issues within Raytheon programs.
  • Conduct security research in keeping abreast of latest security issues.
  • Lead several team training exercises on security issues including DOM XSS, jQuery Security Issues, and Java Deserialization Vulnerabilities.

Show More

26 Security Issues Jobs

No jobs at selected location

48. Security Standards

demand arrow
low Demand
Here's how Security Standards is used in Information Security Engineer jobs:
  • Administer information security standards, policies and procedures that safeguard the infrastructures corporate data.
  • Maintained data privacy, integrity and security standards while preparing evidence for examination.
  • Developed the company's technical security standards for Active Directory and Domain Controllers.
  • Draft enterprise security standards and guidelines for system configuration.
  • Helped create and maintain company security standards and policies to include: Access Controls, Infrastructure, Methodologies, etc.
  • Oversee development team and ensure application security standards are being followed and compliant with the DHS policies and security handbook.
  • Authored enterprise security standards, policies, and guidelines that align with executive leadership goals and objectives.
  • Developed operating system and application security standards in perimeter defense, endpoints, VPN, Windows.
  • Participate in the creation of security standards to ensure the secure implementation of emerging technologies.
  • Group Policy creation and review to ensure all enforced security standards are met.
  • Assist in meeting payment card industry data security standards for yearly compliance.
  • Designed, implemented, and managed mission critical IT security solutions used to maintain the required security standards for the organization.
  • Consult SMEs how to incorporate IT security standards into applications to meet HIPPAA, SOX, and PCI regulations.
  • Work closely with other DoD project teams to ensure functionality of Palantir deployments while maintaining DoD security standards.
  • Performed Hardening of Solaris 8 servers as per the Capital one Security Standards.

Show More

48 Security Standards Jobs

No jobs at selected location

49. Data Loss

demand arrow
low Demand
Here's how Data Loss is used in Information Security Engineer jobs:
  • Plan and implement records migration from security systems to facilitate protecting data loss.
  • Analyzed security and data loss prevention logs.
  • Investigate and resolve Data Loss Prevention incidents via Vontu, maintaining 100% SLA for incident response.
  • Assist in the implementation, setup, and management of Symantec DLP (Data Loss Prevention).

Show More

22 Data Loss Jobs

No jobs at selected location

50. POA

demand arrow
low Demand
Here's how POA is used in Information Security Engineer jobs:
  • Brief Senior Executive Management regarding system documentation, identified vulnerabilities, and POA&M remediation.
  • Collaborated with the developers, system administrators, engineers, information owners on matters regarding POA&M findings.
  • Worked with IA team members to define items for Plan of Actions and Milestones (POAM).
  • Develop Plan of Action and Milestone (POA&M) recommendations during DIACAP process.
  • Created a POA&M addressing all vulnerabilities for a classified network.
  • Project managed remediation efforts using POA&M model.
  • Managed POA&M remediation.
  • Create plans of actions and milestones (POA&M).
  • Complete remediations and POAM's for identified vulnerabilities on Windows Servers, Linux Servers, and Microsoft SQL database systems.
  • Performed enterprise wide vulnerability assessment on Comcast systems and developed Plan of Action and Milestone (POA&M).
  • Created, maintained and updated Plan of Actions and Milestones (POA&M) for various systems/LANs.
  • Coordinated with ISSOs for mitigating vulnerabilities included in the POA&M.
  • Track and remediate vulnerabilities (POAM's).

Show More

1 POA Jobs

No jobs at selected location

Information Security Engineer Jobs

NO RESULTS

Aw snap, no jobs found.

20 Most Common Skills For An Information Security Engineer

Vulnerability Assessments

11.4%

Firewall

9.9%

Ensure Compliance

9.8%

Information Security

8.5%

Infrastructure

6.8%

Security Policies

5.7%

Information Technology

4.7%

Windows XP

4.5%

Incident Response

4.0%

Security Audits

4.0%

Assurance

3.8%

Disa

3.6%

Nist

3.3%

Network Security

3.3%

IDS

2.9%

Ips

2.9%

PCI DSS

2.8%

System Security

2.7%

Security Assessment

2.7%

DOD

2.7%
Show More

Typical Skill-Sets Required For An Information Security Engineer

Rank Skill
1 Vulnerability Assessments 7.3%
2 Firewall 6.3%
3 Ensure Compliance 6.3%
4 Information Security 5.5%
5 Infrastructure 4.4%
6 Security Policies 3.7%
7 Information Technology 3.0%
8 Windows XP 2.9%
9 Incident Response 2.6%
10 Security Audits 2.6%
11 Assurance 2.4%
12 Disa 2.3%
13 Nist 2.1%
14 Network Security 2.1%
15 IDS 1.9%
16 Ips 1.9%
17 PCI DSS 1.8%
18 System Security 1.8%
19 Security Assessment 1.8%
20 DOD 1.8%
21 Mcafee 1.7%
22 Siem 1.6%
23 Intrusion Detection 1.6%
24 Nessus 1.6%
25 VPN 1.5%
26 Active Directory 1.4%
27 Endpoint 1.4%
28 Linux 1.4%
29 Security Tools 1.4%
30 Risk Assessments 1.4%
31 Security Requirements 1.3%
32 Internet 1.2%
33 Security Solutions 1.2%
34 Fisma 1.2%
35 Diacap 1.2%
36 RSA 1.1%
37 Security Incidents 1.1%
38 Access Control 1.1%
39 Security Posture 1.1%
40 SOX 1.0%
41 Unix 1.0%
42 Checkpoint 1.0%
43 Disk 1.0%
44 SQL 1.0%
45 Retina 0.9%
46 DLP 0.9%
47 Security Issues 0.9%
48 Security Standards 0.9%
49 Data Loss 0.8%
50 POA 0.8%
{[{skill.rank}]} {[{skill.name}]} {[{skill.percentageDisplay}]}%
Show More

23,457 Information Security Engineer Jobs

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.