FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.
Sorry, we can't find that. Please try a different city or state.

Senior Information Security Engineer

This job has expired and is no longer available.
APPLY NOW
Apply Now
×
FIND
PERSONALIZED JOBS

Sorry, we can't find that. Please try a different city or state.

CONTENT HAS
BEEN UNLOCKED
Close this window to view unlocked content
or
find interesting jobs in

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign Up

SIGN UP TO UNLOCK CONTENT

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign up to save the job and get personalized job recommendations.

Sign up to dismiss the job and get personalized job recommendations.

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Already have an account? Log in

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Company Saved

Answer a few questions and view jobs at that match your preferences.

Where do you want to work?

Job Saved

See your Saved Jobs now

or

find more interesting jobs in

Job Dismissed

Find better matching jobs in

Your search has been saved!

Top 50 Senior Information Security Engineer Skills

Below we've compiled a list of the most important skills for a Senior Information Security Engineer. We ranked the top skills based on the percentage of Senior Information Security Engineer resumes they appeared on. For example, 7.4% of Senior Information Security Engineer resumes contained Ensure Compliance as a skill. Let's find out what skills a Senior Information Security Engineer actually needs in order to be successful in the workplace.

These are the most important skills for a Senior Information Security Engineer:

1. Ensure Compliance

demand arrow
high Demand
Here's how Ensure Compliance is used in Senior Information Security Engineer jobs:
  • Conduct regular audits to ensure compliance with established security standards.
  • Monitor the security integrity of government information systems to ensure compliance with laws, policies, regulations and directives.
  • Coordinate Assessment and Authorization (A&A) activities, to ensure compliance with FISMA mandates.
  • Design and implement security policies and procedures to ensure compliance to policies and procedures.
  • Audited computer systems to ensure compliance with mandated policies.

Show More

2. Information Security

demand arrow
high Demand
Here's how Information Security is used in Senior Information Security Engineer jobs:
  • Managed daily information security activities for an international company of 1300; delegated IT security maintenance responsibilities to information security group.
  • Led, mentor, and informally manage technical & non-technical team members to facilitate/implement the appropriate Information Security strategies and controls.
  • Lead outcome-focused training sessions to instruct military and contract personnel in information security best practices and promote secure computing environment.
  • Participate in investigations of suspected information security policy violations or in compliance reviews as requested by auditors or customers.
  • Focused on identifying information security vulnerabilities and recommended solutions to secure client IT environments.
  • Implement information security policies, business contingency planning and procedures for the organization.
  • Reviewed information security controls to ensure maintenance of SOX compliance.
  • Identified Information Security risks and proposed mitigation to management.
  • Establish information security policy affecting regional area of responsibility.
  • Realigned Information Security Personnel goals to match executive goals.
  • Reported directly to the Information Security Director.
  • Project Manager of $50-million budget developing policies and plans for information security and network systems.
  • Provide expertise, insight, and leadership while ensuring top performance of information security program.
  • Project Manager for $200-million budget for four Department of Defense projects for Information Security.
  • Assist in the development of an Information Security program from the ground up.
  • Provide expertise on information security for new and ongoing projects.
  • Performed on-site Information Security Risk assessments on 3rd parties.
  • Team lead supporting company initiatives relating to information security within the financial services industry.
  • support as a Sr. Information Security Engineer Lead with role and responsibilities the same as in position with Computer Sciences Corporation.
  • Managed a team of information security and technology personnel to create a virtual lab for testing the propagation of malware.

Show More

39 Information Security Jobs

No jobs at selected location

3. Vulnerability Assessments

demand arrow
high Demand
Here's how Vulnerability Assessments is used in Senior Information Security Engineer jobs:
  • Performed vulnerability assessments with validation via external/internal vulnerability scans.
  • Provided oversight and review of technical documents to include network diagrams, evaluations, and vulnerability assessments.
  • Perform vulnerability assessments, security audits, and development of business continuity/disaster recovery procedures for clients.
  • Performed vulnerability assessments using a combination of commercial, custom, and open-source assessment tools.
  • Perform on-site and/or off-site Information Assurance support to JITC including vulnerability assessments.
  • Provided metrics on vulnerability assessments and recommended remediation activities.
  • Performed vulnerability assessments, remediation and security hardening.
  • Conducted ongoing penetration and vulnerability assessments as required.
  • Performed security/vulnerability assessments for web and mobile applications.
  • Perform passive evaluations (compliance audits) and active evaluations (vulnerability assessments).
  • Created technical articles, requirements documents, statements of work, and vulnerability assessments.
  • Perform Vulnerability assessments on all hardware/software and recommend mitigations to system engineers.
  • Performed Vulnerability Assessments Managed secure windows and server images

Show More

7 Vulnerability Assessments Jobs

No jobs at selected location

4. Firewall

demand arrow
high Demand
Here's how Firewall is used in Senior Information Security Engineer jobs:
  • Evaluate all firewall configuration changes and justifications for new server communication to determine the security impact to the networking environment.
  • Collaborate with Network Operations team to configure and monitor firewalls to prevent unauthorized access and report access violations.
  • Provide firewall support and engineering analysis and design as well as security audits.
  • Identified and mitigated exploitation of multiple vulnerabilities affecting all Cisco ASA/PIX/FWSM firewalls.
  • Evaluated firewall change requests and assessed organizational risk.
  • Established a change control process for all firewall configuration changes, providing a clear process for approval and documentation.
  • Handle daily trouble tickets submitted by users that are either remote access, firewall, or proxy related.
  • Operate, Manage, Monitor the Host Intrusion Prevention (HIPS) IPS and Firewall events.
  • Provided complex engineering analysis and support for firewalls, routers, networks and operating systems.
  • Deployed Cisco ASA and Checkpoint firewalls to new office or store locations.
  • Perform OS upgrade and patch updates to the Cisco and Checkpoint firewalls.
  • Perform DR Drills for the Firewalls in High Availability mode.
  • Managed and maintained the internal Open Source firewalls.
  • Designed, configured and implemented Check Point and Pix/ASA firewalls into many different environments.
  • Engineered the Extranet/Firewall connection for Boston Coach's Airline/Hotel/Car Rental Global reservation systems.
  • Configured, Managedand Monitored Sidewinder Firewalls.
  • Monitor all firewall and load balancer log data to ensure the integrity of the networking environment.
  • Implemented FireMon for Check Point, Juniper and Palo Alto firewalls for Audit and compliance.
  • Manage Checkpoint firewalls for over 850 Macy's and Bloomingdales store.
  • Managed full firewall replacement from ASA to Palo Alto.

Show More

8 Firewall Jobs

No jobs at selected location

5. Infrastructure

demand arrow
high Demand
Here's how Infrastructure is used in Senior Information Security Engineer jobs:
  • Communicated alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.
  • Established Threat Management Working Group to coordinate patching between infrastructure groups and business units.
  • Perform a security assessment of the SRA network infrastructure using various vulnerability scanners.
  • Led SiteMinder Web Agent integration efforts for migrating to SiteMinder 12.51 infrastructure.
  • Developed annual information security budget for capital infrastructure improvements using DCID 6/9.
  • Initial Design and implementation of internal enterprise PKI infrastructure.
  • Provided engineering for the company security infrastructure.
  • Translated, implemented, and integrated all Security Requirements for SEMPRA to the Enterprise Networking Group to secure the infrastructure.
  • Enforce U.S. Treasury security policies in addition to CIS Benchmark security standards on all EBS systems including network infrastructure Devices.
  • Find cost savings in establishing a redundant IPSEC infrastructure to replace old single leased line and T1 connectivity with partners.
  • Provided information security guidance in securing the SRA-CPMS Enclave within the SRA network infrastructure.
  • STIR is web-based infrastructure for information and other services to external and IRS users.
  • Managed incident response from outside threat-actors to protect the brand and infrastructure.
  • Analyze and track overall infrastructure needs for purposes of protecting data.
  • Perform vulnerability and risk assessments for web applications and network infrastructure utilizing vulnerability management tools.
  • Understand Customer requirement to set-up Security infrastructure for hosting of Offshore Development Centers (ODC).
  • Created and implemented the Nvidia (PKI) Private Key Infrastructure.
  • Innovated a live standup and test of network infrastructure for system recovery without breaking replication of data to Sungard.
  • Developed all documentation (CONOPs, SOPs) relating to design & implementation of network infrastructure.
  • Worked on the Architectural design of the Viligance security infrastructure to be used on Veridian s commercial IPO startup of Veritect.

Show More

19 Infrastructure Jobs

No jobs at selected location

Job type you want
Full Time
Part Time
Internship
Temporary

6. Security Policies

demand arrow
high Demand
Here's how Security Policies is used in Senior Information Security Engineer jobs:
  • Work authoring and updating information security policies to respond to technological changes, and better facilitate city business.
  • Implemented, enforced and communicated security policies and/or plans for data, software applications, hardware and telecommunications.
  • Evaluated system compliance to established security policies and guidance.
  • Authored and published Security policies for SEMPRA's Geographic Information System (GIS) Software.
  • Author security policies, procedures, standards, and guidelines for computing infrastructure.
  • Assisted in the creation of local security policies and guidance.

Show More

7 Security Policies Jobs

No jobs at selected location

7. Information Technology

demand arrow
high Demand
Here's how Information Technology is used in Senior Information Security Engineer jobs:
  • Evaluated discovered security findings and provided guidance for bringing information technology systems to NIST security compliance.
  • Managed information security budgets and expenditures while enforcing compliance with information technology standards.
  • developed and implement methods for management and control of access to 360Networks Information Technology assets and proprietary company information.

Show More

3 Information Technology Jobs

No jobs at selected location

8. Architecture

demand arrow
high Demand
Here's how Architecture is used in Senior Information Security Engineer jobs:
  • Last Mile network connectivity solutions requirements and network connectivity architectures are security assessed for communications diversity to FAA Operational Facilities.
  • Validated and tested security architecture and design solutions to produce detailed engineering specifications with recommended vendor technologies.
  • Developed Security Architectures for SOA employing 2-Way SSL, SAML, and Secure File Transfer for Data Transformation and Orchestration.
  • Performed IA Engineering support (design, architecture, development, integration, certification and accreditation).
  • Developed enterprise IT security architecture for the US Department of the Interior.
  • Designed and implemented secure network architecture over a 60,000+ node worldwide network.
  • Reviewed and tested multilevel security (MLS) systems and architectures.
  • Design, architecture and installation of SailPoint IIQ solution.
  • Conduct security review and assessment on JOC NDC architecture.
  • Designed security architecture for web and mobile apps.
  • Supported a small security architecture engagement with British Telecom focused on expanding their Security Operations Center (SOC) capabilities.
  • Created, implemented, and maintained technical controls documentation, security architecture documents, and business requirements documentation.
  • Developed enterprise architecture best practices for EOps to be implemented to reduce risk.
  • Develop Network Architecture visios for Enterprise wide Data Center Virtualization project using VMWare.

Show More

11 Architecture Jobs

No jobs at selected location

9. Assurance

demand arrow
high Demand
Here's how Assurance is used in Senior Information Security Engineer jobs:
  • Recommend processes for maintaining and enforcing security/Information Assurance for identified systems, networks and systems in support of security engineering.
  • Provide security engineering designs and implementation in all aspects of Information Assurance and Information Security (InfoSec) Engineering.
  • Support security/Information Assurance requirements definition by identifying controls to be put in place for the identified systems and networks.
  • Conducted research on information assurance systems, security measures, and security products.
  • Conducted extensive analysis and research in information assurance field.
  • Provide technical expertise and subject matter support to Global Network Operations Command's (GNOC) Information Assurance Compliance team.
  • Provided senior level information assurance support to the Command IAM and CIO via communicating orally and in writing.
  • Review Information Assurance Vulnerability Alerts (IAVA) for applicability and impact to the range of networks.
  • Develop documentation for test reporting and Information Assurance (IA) artifacts to support certification activities.
  • Presented, and published instruction and training materials across a range of information assurance topics.
  • Provided daily coordination with information assurance managers to ensure IAVA and STIG compliance.
  • General assessments of information assurance policy, plans, programs, infrastructure.
  • Utilized 800 series to provide assurance.
  • Develop Security Assurance and Implementation Guidelines for the Enterprise when using VMWare to deploy servers and applications.

Show More

4 Assurance Jobs

No jobs at selected location

10. Incident Response

demand arrow
high Demand
Here's how Incident Response is used in Senior Information Security Engineer jobs:
  • Provided network incident response for network intrusions and email vulnerabilities.
  • Support security incident response as required.
  • Developed incident response plan and procedures.
  • Researched testing tools, techniques, and process improvements in support of security event monitoring, detection and incident response.
  • Developed the Computer Incident Response Methodology (Policy, Plan, Playbook), which lead to increased interdepartmental collaboration.
  • Provided enterprise level forensics and incident response to First Data Corporation which is a company of over 30,000 members.
  • Demonstrate expert-level knowledge in planning, directing, and managing a Computer Incident Response Team (CIRT).
  • Led the execution of the incident response process, providing advanced analysis and direction.
  • Worked in the information and incident response center as a senior level engineer.
  • Board member of the Incident Response Emergency Team.
  • Provided security related on-call emergency support, acting as a security first responder on the Security Incident Response Team.

Show More

11 Incident Response Jobs

No jobs at selected location

11. Disa

demand arrow
high Demand
Here's how Disa is used in Senior Information Security Engineer jobs:
  • Managed security policies, disaster recovery, release management, systems maintenance and operations.
  • Provide in-depth knowledge of business continuity and disaster recovery planning and validation methodologies.
  • Assisted with coordinating disaster recover, business continuity and incident management exercises.
  • Facilitated the company's Certificate Authority annual audits and disaster recovery tests
  • Performed vulnerability analysis utilizing such tools as Defense Information Systems Agency (DISA) GoldDisk.
  • Monitored network at DISA Headquarters in Washington.
  • Implement ePO snapshot for new environment and Disaster Recovery (DR).
  • Experience with DISA's Gold Disk application and SRRs, checklists.
  • Sole architect for 3 Disaster Recovery scenario tests at Sungard.
  • Provided DISA Security standards including the Gold Disk, SRR, STIGs, IAVA and IAVB.
  • Provide guidance and training to engineers learning the DITSCAP process Perform system scanning using DISA PGD Gold
  • Ensured compliance/reporting for DISA VMS Program - IAVAs, STIGs, Directives.

Show More

2 Disa Jobs

No jobs at selected location

12. Risk Management

demand arrow
high Demand
Here's how Risk Management is used in Senior Information Security Engineer jobs:
  • Created Privacy Risk Management framework A Methodology for Privacy Risk Management of Personally Identifiable Information to help manage privacy risks.
  • Designed and Writing packages and templates for Risk Management Framework (RMF) on IATC/ATC project.
  • Developed a Risk Management Framework that enabled Cybersecurity modernization efforts.
  • Review of selected approaches, methods, tools especially, risk analysis and risk management.

Show More

8 Risk Management Jobs

No jobs at selected location

13. Nist

demand arrow
high Demand
Here's how Nist is used in Senior Information Security Engineer jobs:
  • Created software tools as required to automate system administration processes.
  • Administered training for appropriate use of portable electronics devices.
  • Developed & administered enterprise wide security awareness training.
  • Developed and completed security plans based on the National Institute of Standards and Technology (NIST) Security Publications.
  • Programmed EnCase EnScripts based on the exploitation needs of the Government customer that are currently being used in Afghanistan.
  • Established a new Vulnerability Management Program according to the NIST Guidance.
  • Developed and conducted security tests and evaluations based on NIST 800-53A.
  • Review group policies for potential NIST SP 800-53 Rev4 violations.
  • Created C&A packages for NCI utilizing NIST guidance.
  • Group Policy (Domains & Organizational Units) - Administration.
  • Recommend and perform Continuous Monitoring using NIST SP 800-37 guidelines.
  • Administered at the command line using Exchange Management Shell.
  • Assisted Operations team with CentOS and Windows system administration.
  • Configured 3rd party LDAP servers for User Administration.
  • Plan, work and administers policies.
  • Review systems against the IRS Publication 1075 (based on NIST SP 800-53 rev.3/4) for compliance.
  • Conducted NIST 800-53 and DHS 4300a audits.
  • Administered cryptography, certificate management and implemented dual keys to address segregation of duties issue between DBAs and security admins.
  • Manage multiple system administration and engineering projects supporting Datek BackOffice organization.
  • Evaluated and updated NIST special publications database.

Show More

15 Nist Jobs

No jobs at selected location

14. Cyber

demand arrow
high Demand
Here's how Cyber is used in Senior Information Security Engineer jobs:
  • Initiated CyberSecurity business development efforts which increased profit by $1.6M in the first year of employment.
  • Performed numerous cyber-investigations ranging up to $30M and operational forensics reviews for client companies.
  • Authored Cybersecurity narratives for successful contract award and scoping of new projects.
  • Identified major gaps and redundancies within cyber security architecture.
  • Provide customized cyber threat briefings to high profile VIPs reflecting relevant threats to their respective area of operations.
  • Ensured accurate and complete reporting for BIMA responses to USCYBERCOM and ARCYBER directed networks configuration hardening initiatives.
  • Lead the on-call rotation for Cyber Security to track remediation, for correct team assignment.
  • Conduct cyber security-oriented verification and validation (V&V) analyses for NASA missions.
  • Interacted and briefed senior government leadership on issues within the Cyber Security at NCE.
  • Performed Cyber Threat Analysis using NetIQ Security Manager that was deployed throughout the AFSPC NIPRNet backbone.
  • Investigated and analyzed cyber security threats to determine best course of action to protect company.

Show More

21 Cyber Jobs

No jobs at selected location

15. DOD

demand arrow
average Demand
Here's how DOD is used in Senior Information Security Engineer jobs:
  • Achieved and maintained Government IA certification and accreditation requirements using DoD 8500 series.
  • Planned and managed Security Test and Evaluations (ST&E) to ensure compliance with DoD IA controls.
  • Review new policy directives released by DOD and Army and provide impact analysis reports to project senior leadership.
  • Used SOA Framework for integration and consolidation activities within the Air Force and DoD enterprise systems.
  • Participated in design review of systems and system modifications for impact to security using DoD 8500.
  • Ensured IS compliance with all Federal, DoD and Air Force policies and guidelines.
  • Developed and executed C&A program within a DOD and Civil Government Agency.
  • Developed security templates Windows Servers for compliance with DOD and Army guidance.
  • Demonstrate understanding of DoD accreditation policies, processes, and practices.
  • Demonstrate experience in a DoD or IC IT environment.
  • Maintained C++ code changes in DoD LRA application.
  • Administered/managed Vulnerability Management System (VMS) and the DoD's Security Technical Implementation Guides (STIGs).
  • Perform Certification & Accreditation on systems through eMASS using DoD 8500.2 controls.

Show More

7 DOD Jobs

No jobs at selected location

16. Security Requirements

demand arrow
average Demand
Here's how Security Requirements is used in Senior Information Security Engineer jobs:
  • Reviewed and approved application security requirements for LDAP connectivity and authentication.
  • Assisted with development of company's computer security requirements and policies.
  • Assess impact of security requirements in accordance with federal regulatory guidance.
  • Assess security requirements and mitigates Earth Observing Systems (EOS) security threats and risks throughout program life cycle.
  • Defined and recommended security requirements concerning EMSEC and testing communications (ST&E).
  • Consulted with CFC users on security requirements for data, applications and processes.
  • Maintain TACACS and SYSLOG to perform to SAS 70 and corporate security requirements.
  • Determine baseline IT Security Requirements for IT Systems.

Show More

16 Security Requirements Jobs

No jobs at selected location

17. Siem

demand arrow
average Demand
Here's how Siem is used in Senior Information Security Engineer jobs:
  • Report provided DHS Headquarters with comprehensive analysis of SIEM tools effectiveness and applicability.
  • Maintained and monitored ArcSight SIEM infrastructure for corporate security.
  • Review security events that are populated in a Security Information and Event Management (SIEM) system.
  • Analyzed correlation rules developed for Security Incident and Event Management (SIEM) system.
  • Deployed, configured & leveraged SIEM capabilities to protect against advanced threats.
  • Established reports, alerting and rules within the SIEM environment.
  • Integrate data and event feeds with ArcSight SIEM.
  • Designed and implemented the SIEM Architecture and process.
  • Tuned SIEM, IPS, and FIM log sources to reduce the false positives.
  • Deployed, tested and documented all procedures for deploying Intellitactics SIEM in the JSIL environment.
  • Co-managed implementation of IBM QRadar SIEM, and integration with Sourcefire NGIPS.

Show More

22 Siem Jobs

No jobs at selected location

18. Network Security

demand arrow
average Demand
Here's how Network Security is used in Senior Information Security Engineer jobs:
  • Tested, configured and documented changes to the Network Security baseline before deployment to production environment.
  • Assisted SLRSC Range/System Engineers in closing open vulnerabilities to harden systems for network security.
  • Performed advance network security architecture studies and security accreditation master planning.
  • Administer the network security of over six separate networks with IPS's, firewalls, routers, and switches.
  • Install, configure, and test network security hardware and software.
  • Direct the activities of one network security intern.
  • Documented whitepapers for custom detection solutions to other sister Computer Network Security Centers.
  • Implemented and managed various network security components including switches, firewalls, VPNs, NIDS, HIDS, and vulnerability scanners.
  • Performed network security scans to ensure all vulnerabilities were remediated to ensure the integrity of the JS lab network.
  • Provided network security by maintaining firewall rules and router acl's.
  • Architected and deployed departmental network security R&D lab facilities in Ashburn, VA facility.

Show More

18 Network Security Jobs

No jobs at selected location

19. Intrusion Detection

demand arrow
average Demand
Here's how Intrusion Detection is used in Senior Information Security Engineer jobs:
  • Monitor security audit and intrusion detection system logs for system and network anomalies.
  • Deployed, performed troubleshooting and upgrades for Network Intrusion Detection/Intrusion Prevention.
  • Maintain and monitor firewall and intrusion detection appliances.
  • Monitored all Intrusion Detection Systems for alerts and determine if remediation is required based upon the investigation of the intrusion details.
  • Run various reports on Intrusion Detection.
  • Perform intrusion detection analysis and anticipates cyber attack vectors.
  • Provided operational and maintenance support for firewalls, intrusion detection systems, VPNs, proxy Servers and enterprise anti-virus systems.
  • Monitor the security of the network, update and install antivirus software and intrusion detection agents.

Show More

9 Intrusion Detection Jobs

No jobs at selected location

20. Fisma

demand arrow
average Demand
Here's how Fisma is used in Senior Information Security Engineer jobs:
  • Performed FISMA compliancy scans/reviews for various DHS components.

Show More

4 Fisma Jobs

No jobs at selected location

21. Diacap

demand arrow
average Demand
Here's how Diacap is used in Senior Information Security Engineer jobs:
  • Assisted IA team in the implementation of DIACAP and application of related C&A tools and processes.
  • Project Manager for scheduling, managing DIACAP projects to the DoD and the U.S. Air Force.
  • Examined DIACAP submissions for accuracy and technical compliance.

Show More

2 Diacap Jobs

No jobs at selected location

22. PCI

demand arrow
average Demand
Here's how PCI is used in Senior Information Security Engineer jobs:
  • Generate auditing documentation for PCI auditors.
  • Provide support for audit and compliance activates including Payment Card Industry (PCI) and Sarbanes-Oxley (SOX).
  • Developed over two hundred custom rules, dashboards and reports in support of Payment Card Industry PCI compliance.
  • Ensured adequate IT controls are in place to ensure compliant with PCI and other future regulatory requirements.
  • Named 'Employee of the Quarter' for work on initial PCI Level One validation effort.
  • Design and document PCI Governance procedures and policies to guide security rules and auditing procedures.
  • Worked closely with compliance teams to ensure federal PCI and FISMA regulations were met.
  • Managed year-two PCI Audit from start to completion 30 days ahead of schedule.
  • Performed PCI compliance, auditing, and review initiatives.
  • Perform PCI DSS security assessments for Fortune 500 clients.
  • Led PCI compliance resolution efforts for Access Management Team.
  • Project leader for annual PCI-DSS Gap Analysis audit.
  • Conducted PCI required Penetration Test of the outsourced call center and fulfillment operation serving the ecommerce line of business.
  • Engineer tasked with writing SOC policies to include Incident Response, PCI Device Onboarding and various other policies.
  • Led PCI audits; hired QSAs, designed and implemented solutions.
  • Prepare and assist with PCI SAQs and quarterly scanning.
  • Lead engineer for PCI compliance management.

Show More

23. Risk Assessments

demand arrow
average Demand
Here's how Risk Assessments is used in Senior Information Security Engineer jobs:
  • Provided risk assessments and vulnerability identification relevant to the security of network resources.
  • Perform technical IT security audits (internal/external) and risk assessments.

Show More

1 Risk Assessments Jobs

No jobs at selected location

24. Internet

demand arrow
average Demand
Here's how Internet is used in Senior Information Security Engineer jobs:
  • Performed research analysis on information technology systems via the internet needed for upgrading and securing SRA network infrastructure.
  • Assisted Corporate Security with their investigations and forensic analysis by interpreting security logs and internet usage reports.

Show More

25. Mcafee

demand arrow
average Demand
Here's how Mcafee is used in Senior Information Security Engineer jobs:
  • Recovered and rebuilt original McAfee server - recommendation for new hardware - built out new McAfee server.
  • Installed and configured McAfee Foundstone for vulnerability scanning, Identify and document newly discovered vulnerabilities and exploits.
  • EXPERIENCE, McAfee console report creation - Upgraded 10,000 McAfee end point base agent and DLP agent resolve issues.
  • Web Post Protection McAfee console - Active directory/ LDAP lookup and exclusions for email to manager notifications and reporting.
  • Scan systems using eEye Retina, Gold Disk, McAfee ePo/Policy Auditor SCAP auditing, and manually according to DISA STIGs.

Show More

2 Mcafee Jobs

No jobs at selected location

26. Security Posture

demand arrow
average Demand
Here's how Security Posture is used in Senior Information Security Engineer jobs:
  • Provided recommendations and guidance for reporting information system security posture.
  • Analyzed cutting-edged technologies that would affect corporate security posture, as well as protecting against unknown risk.
  • Developed documentation that analyzed OIG system security posture against the 20 SANS CIS Critical Security Controls.
  • Ensured on a daily basis a robust security posture and compliance to various DoD/IC mandates.
  • Evaluate the security posture of new products and integration into current systems.
  • Managed various Cyber Security Devices to maintain DoD/IC mandated security posture.
  • Created departmental strategy and roadmap to enhance overall security posture.
  • Obtained Navy system and site information to evaluate security posture of the IT system or site being certified and accredited.
  • Collaborate with application teams to conduct regular reviews and hardening of the security posture of the their applications

Show More

8 Security Posture Jobs

No jobs at selected location

27. Security Tools

demand arrow
average Demand
Here's how Security Tools is used in Senior Information Security Engineer jobs:
  • Maintained the security test lab and evaluated security configurations, patches and security tools in lab environment.
  • Provide technical expertise and guide the administration of security tools that control and monitor information security.
  • Managed the day to day IT security issues while implementing critical security tools that were purchased but not implemented.
  • Work with various vendors for supporting, fixing and improving McAfee Anti-Virus scan and installed security tools.
  • Maintain Windows, and Linux operating systems housing production and testing security tools.
  • Assist and evaluation of new and emerging security tools and technologies.
  • Analyzed security tools and products, delivered information security recommendations regarding client information assurance systems.

Show More

28. Security Engineering

demand arrow
average Demand
Here's how Security Engineering is used in Senior Information Security Engineer jobs:
  • Led the security engineering effort, which included performing security architecture reviews and implementation of numerous security systems and controls.
  • Provide security engineering for implementation in the Symantec Critical Systems enterprise network.

Show More

15 Security Engineering Jobs

No jobs at selected location

29. ATO

demand arrow
average Demand
Here's how ATO is used in Senior Information Security Engineer jobs:
  • Generate vulnerability reports and distribute to System Administrators
  • Demonstrate experience in a forensic laboratory environment.
  • Reset security passwords for database administrators nationwide.
  • Acted as facilitator of the Security Engineering Certification and Accreditation Support Team (SEACAST), selecting presenters and arranging presentations.
  • Verified GAF's adherence to all applicable compliance and regulatory guidelines including PCI, NACHA, and OCIE.
  • Reviewed, evaluated and analyzed Air Traffic Oceanic Procedure (ATOP) external interfaces for potential vulnerabilities.
  • Performed as Risk Management Framework (RMF) for five projects and manage their progress toward IATT/ATO.
  • Created packages for IATT and ATO to complete government contracts for DoD and U.S. Air Force.
  • Update proxy block list with high risk content found through open-source indicators on the internet.
  • Interviewed, hired, mentored, and lead a team of six systems administrators.
  • Host Based Security System (HBSS) Administrator.
  • Managed the DISA cross domain solution laboratory consisting of ten developers and system integrators.
  • Participate in Certification Test and Evaluation (CT&E) events, working closely with certifiers to achieve ATO.
  • Managed 3 Cisco 3000 series VPN concentrators to authenticate against Active Directory by installing IAS on Microsoft Server 2003.
  • Administered VPN access rights for employees and third party customers using Cisco 3000 concentrator with existing RSA server.
  • Ensured comprehensive risk management and regulatory compliance for the protection of US cyber interests.
  • Represented system owners in IATO, initial ATO, and reauthorization efforts.
  • Conducted Powerpoint presentations to DAA/A6 and IAM to attain approval for receiving five ATOs.
  • Assembled all documentation and artifacts for Authority to operate ( ATO ).
  • Worked as a database administrator for Veridian s development Oracle 8i databases residing on Windows NT, and Solaris 9 platform.

Show More

2 ATO Jobs

No jobs at selected location

30. Nessus

demand arrow
low Demand
Here's how Nessus is used in Senior Information Security Engineer jobs:
  • Perform network vulnerability scans with Retina and Nessus.
  • Addressed vulnerabilities found by Tenable/Nessus scanning.
  • Managed the vulnerability scanning (Rapid 7/Nexpose/metasploit, AppScan, Nessus, WebInspect, Scarab etc.)

Show More

3 Nessus Jobs

No jobs at selected location

31. DLP

demand arrow
low Demand
Here's how DLP is used in Senior Information Security Engineer jobs:
  • Monitor and configure Websense DLP to audit data transmission and limit exfiltration of restricted data.

Show More

32. Active Directory

demand arrow
low Demand
Here's how Active Directory is used in Senior Information Security Engineer jobs:
  • Maintained test domain Active Directory infrastructure that mirrored production environment.
  • Review any security risks and offer remediation for windows based systems, Active Directory in specific.
  • Authored several Active Directory scripting tools for InfoSec process improvement and reporting needs for user provisioning and de-provisioning.

Show More

1 Active Directory Jobs

No jobs at selected location

33. SME

demand arrow
low Demand
Here's how SME is used in Senior Information Security Engineer jobs:
  • Spearheaded creation of four new information-security departments, including Risk Assessment, Vulnerability, Penetration Testing, and Security Engineering services.
  • Helped develop high-quality assessments to enhance the company's ability to identify and resolve security-related events as they occurred.
  • Performed information security risk assessments and serve as an internal auditor for Information Security issues.
  • Conduct risk assessments and gap analysis, advocating security measures in line with contractual obligations.
  • Managed DEA-wide Computer Security Assessment Training program for web security.
  • Develop network assessment and remediation program.
  • Managed security assessments to ensure compliance to firm's security standards (i.e., OWASP Top 10, SANS25).
  • Performed third party (ASP) application service provider assessments Accomplishments: Created and implement the risk assessment methodology.
  • Perform vulnerability assessment for Earth Observing systems (EOS) subsystems in accordance with FISMA policies and procedure.
  • Played the role of an SME for secure coding guidelines for enterprise applications across the business lines.
  • Open LDAP, Active Directory, hardened host configurations and SME for HP Security policy development.
  • Support large financial institutions and assist them with compliance and assessment projects.
  • Participated in the development of IT risk assessments for enterprise applications.
  • Served as SME for advanced network based security controls analysis.
  • Served as SME for web application penetration testing.
  • Serve as SME for Active Directory from Infosec Perspective.
  • Served as SME for advanced anti-malware systems.
  • Conducted security control assessments Responsible for providing IA guidance and identifying IA requirements for system development and/or engineering projects.
  • Experience with Insider Threat Assessments - Security+ certification -Certificate of Cloud Security Knowledge (CCSK)
  • Matured "3rd party" risk assessment process to attain COBIT level 4.

Show More

2 SME Jobs

No jobs at selected location

34. Security Assessment

demand arrow
low Demand
Here's how Security Assessment is used in Senior Information Security Engineer jobs:
  • Perform security assessments on University campus systems and servers.
  • Conducted 3rd party vendor security assessments.
  • Conducted security assessment of Cryptography applications including the apps that use Hardware Security Model (HSM).
  • Created and documented the Anthelio process for performing regular security assessments on internal and client site firewalls.

Show More

5 Security Assessment Jobs

No jobs at selected location

35. Linux

demand arrow
low Demand
Here's how Linux is used in Senior Information Security Engineer jobs:
  • Developed technical standards for server environments consisting of IBM AIX, SUN-SOLARIS, LINUX and WINDOWS Servers.
  • Installed and configured Linux Centos, software packages and Bastille Linux hardening software in accordance with NASA Goddard security objectives.

Show More

3 Linux Jobs

No jobs at selected location

36. Security Solutions

demand arrow
low Demand
Here's how Security Solutions is used in Senior Information Security Engineer jobs:
  • Researched security solutions and products for information security management performance.
  • Test security solutions to detect security weaknesses.
  • Designed and implemented security solutions.
  • Recommended IT security solutions with regard to cloud networking.
  • Architected and deployed network and security solutions to meet customer identified goals.

Show More

24 Security Solutions Jobs

No jobs at selected location

37. IDS

demand arrow
low Demand
Here's how IDS is used in Senior Information Security Engineer jobs:
  • Monitor and review IDS/IPS events, server and other network device logs, respond to events and provide reporting to management.
  • Managed various security devices, including but not limited to IDS/IPS, firewalls, and proxy switches.
  • Host and Network IDS architecture, implementation, monitoring and administration (HIDS & NIDS).
  • Monitored and analyzed Intrusion Detection Systems (IDS) to identify security issues for remediation.
  • Developed and performed log, IDS, and file integrity monitoring processes.
  • Administer and manage IDS agents & policies via the IBM SiteProtector console.
  • Manage tickets in Remedy regarding proxy settings, port settings/access, SourceFire monitoring IDS tools, and other antivirus/firewall/IDS responsibilities.
  • Work maintaining and updating the Snort IDS and Proventia (ISS Site Protector) IPS networks.
  • Monitored IPS/IDS events and managed policy integraton output into ArcSight SIEM.
  • Implemented and managed Symantec HIDS and ESM enterprise-wide.
  • Implemented Information Systems & Global Solutions principle open-source IDS.

Show More

1 IDS Jobs

No jobs at selected location

38. Ips

demand arrow
low Demand
Here's how Ips is used in Senior Information Security Engineer jobs:
  • Negotiated vendor contracts; supervised vendor relationships for installations and maintenance.
  • Participate in frequent communications with the IRS Safeguards client and maintain various relationships with the management team.
  • Assist in ensuring up-to-date software updates and signatures were pushed to operational IPS devices.
  • Enforced Industrial Information System Security Standards according to NIST, FIPS and ICD.
  • Deployed Checkpoint SmartEvent NGSE for analyzing IPS and threat events.
  • Managed partner and vendor relationships for equipment and services.
  • Build and maintains relationships with various technology vendors.
  • Prepared FIPS 199, FIPS 200, SSP to 800-53A (Rev 3), RAR, System Inventories, etc.

Show More

17 Ips Jobs

No jobs at selected location

39. POA

demand arrow
low Demand
Here's how POA is used in Senior Information Security Engineer jobs:
  • Performed enterprise wide vulnerability assessment on the VA systems and developed Plan of Action and Milestones (POA&M).
  • Documented unmitigated discrepancies, countermeasures that are in place and POA&M for addressing open risk and residual risk items.
  • Provided POAMS (Plan of Actions and Milestones) in the event that a patch was not applied.
  • Resolved subsequent audit findings and Plan of Actions and Milestone (POA&M) tasks.
  • Coordinate plans of actions and milestones (POA&Ms) so they are completed timely and submitted as required.
  • Assisted ISSOs in reviewing and submitting Artifacts to justify POA&M Closure.
  • Maintain Ongoing Authorization requirements and Track and monitor POAMS in Xacta.
  • Developed remediations, mitigations, and POA&Ms.

Show More

1 POA Jobs

No jobs at selected location

40. VPN

demand arrow
low Demand
Here's how VPN is used in Senior Information Security Engineer jobs:
  • Configure and monitor VPN connections between various networks and user groups.
  • Implemented open source public/private key technologies for secure VPN remote access.
  • Implemented and supported 5 VPN IPSEC solutions.
  • Configure LinkSys Cable / DSL Routers for VPN (RAS) users.
  • Managed perimeter security, B2B VPNs on Cisco firewalls.

Show More

41. Arcsight

demand arrow
low Demand
Here's how Arcsight is used in Senior Information Security Engineer jobs:
  • Worked with local programmers and Network General staff to have InfiniStream full packet capture capability from ArcSight console providing forensics capability.
  • Configured and maintained ArcSight Management Console appliances.
  • Perform installation, configuration, and technical administration of ArcSight product components, to include: ArcSight ESM and Logger.
  • Managed, upgraded and maintained operational data flows and ArcSight platforms.
  • Provided support to content development tasks and analyzed ArcSight data sources.
  • Monitor Security Event Management Solution (i.e., ArcSight).
  • Implemented and managed ArcSight ESM and Connectors at multiple locations.
  • Analyzed ArcSight and related tools and resolved IT security failures.
  • Provided offsite training for ArcSight web support to local incident handling shops located at 12 Major Operating Bases throughout European Theater.
  • Developed real-time and historic ArcSight content for intelligence, anomaly, statical, signature, and behavioral based detection.
  • Developed custom solution using .net framework reporting DNS information to ArcSight ESM platform.
  • Categorize the messages generated by security and networking devices into the multi-dimensional Arcsight normalization schema.
  • Develop and test Arcsight asset modelling, it is used to populate asset properties in Correlation rules and reports.
  • Work with other major SEIM tools including Splunk, McAfee Nitro, and other SEIM tools to complement Arcsight capabilities.
  • Provided engineering support for ArcSight ESM 3.5/4.0, McAfee IntruShield/Symantec ITA/Symantec SiteProtector/Sidewinder Firewall/FRED/eEye Retina/Bluecoat proxies.

Show More

1 Arcsight Jobs

No jobs at selected location

42. Security Issues

demand arrow
low Demand
Here's how Security Issues is used in Senior Information Security Engineer jobs:
  • Advised senior management regarding security issues/gaps of new products.
  • Performed a review of all external facing Genesys applications for security issues.
  • Key participant in providing local engineering support in resolving Cyber Security issues at NCE.

Show More

14 Security Issues Jobs

No jobs at selected location

43. Access Control

demand arrow
low Demand
Here's how Access Control is used in Senior Information Security Engineer jobs:
  • Created company policies and procedures governing corporate security, email and Internet usage, access control, and incident response.
  • Deployed & managed Network Access Control System, Network Intrusion prevention systems, and Endpoint Security Solutions.
  • Managed and audited enterprise firewall rules & access control list.
  • Configure and manage server with physical access controls.

Show More

1 Access Control Jobs

No jobs at selected location

44. PKI

demand arrow
low Demand
Here's how PKI is used in Senior Information Security Engineer jobs:
  • Developed the Security Test Plan (STP) for a PKI implementation.
  • Entrust PKI and Security Management.
  • Lead engineer in design, development, and launch of CA server for Commercial PKI (CPKI) pilot.
  • Engineered systems for company's PKI, including Netscape / Iplanet CMS, LDAP, and web servers.
  • Worked as lead engineer on PKI - Biometric dual authentication pilot project.
  • Created custom JAVA servlet middleware, to allow multiple PKI compatibility on servers.

Show More

6 PKI Jobs

No jobs at selected location

45. Splunk

demand arrow
low Demand
Here's how Splunk is used in Senior Information Security Engineer jobs:
  • Installed Splunk universal forwarders on Windows systems and configured it to send logs to the new Spunk enterprise server.
  • Use Splunk to develop searches to investigate network anomalies and to troubleshoot IT issues.
  • Configure the Splunk enterprise server to point to an external master license server.
  • Manage user account access to Splunk enterprise server.
  • Customize the syslog-ng server to receive logs from other operating systems to archive and send logs to the Splunk enterprise server.

Show More

12 Splunk Jobs

No jobs at selected location

46. Accreditation Process

demand arrow
low Demand
Here's how Accreditation Process is used in Senior Information Security Engineer jobs:
  • Developed system security plans and technical architectures plans, in support of the Certification and Accreditation process.
  • Managed contractor teams providing support throughout the System Development Life-Cycle to include the accreditation process.

Show More

3 Accreditation Process Jobs

No jobs at selected location

47. ISO

demand arrow
low Demand
Here's how ISO is used in Senior Information Security Engineer jobs:
  • Manage others either directly or through subordinate supervisors.
  • Frequent travel to Army installations for security compliance inspections, updating system hardware and software, and liaison with on-site management.
  • Designed and created packages to meet ISO 27001 policies concerning security standards and compliance.
  • Trusted advisor to USAITA stakeholders to identify options for security architectures and solutions to meet mission requirements.
  • Monitor security advisories and ensure security updates, patches and preventive measures are in place throughout the relevant Vantiv computing environments.
  • Support Earth Observing System Information Security Operations Center (EISOC) Code 423/428 operations and maintenance for NASA EBnet connectivity.
  • Provide ad-hoc support as required by the CISO, global missions, or other Agency Bureau or Program Offices.
  • Program manager for 36 person task order supporting the agency CISO and Cybersecurity Office.

Show More

5 ISO Jobs

No jobs at selected location

48. Security Incidents

demand arrow
low Demand
Here's how Security Incidents is used in Senior Information Security Engineer jobs:
  • Leveraged ticketing systems to manage the security incidents and responses working with cross-functional teams.
  • Managed security incidents and performed forensics from identification through remediation and lessons learned.

Show More

13 Security Incidents Jobs

No jobs at selected location

49. Unix

demand arrow
low Demand
Here's how Unix is used in Senior Information Security Engineer jobs:
  • Worked with Windows and UNIX network administration teams to complete vulnerability and patch management assessments and implementation releases.
  • Demonstrate a strong knowledge of the Windows operating system, knowledge in various Linux distributions and the UNIX framework.
  • Implemented secure configurations over 12 inter/intranet web sites (UNIX and NT) to include the main company website.
  • Search and monitor all User Privilege Account activities on all Unix, Linux, and Windows systems.
  • Worked with Client Server Support Group to establish Windows 2000 and Unix installation security guidelines.
  • Search and monitor Escalated User Accounts in Unix and Linux systems.
  • Used Windows, Linux and Unix environments on various cases.
  • Search and monitor all active Cron Jobs (on Unix), and Scripts across multiple Network Operating Systems.
  • Architected environment and assisted UNIX team with management of IBM P5 series cluster UNIX computing systems.
  • Used Windows, various flavors of Linux, Unix, Solaris and Mac OS/X.

Show More

1 Unix Jobs

No jobs at selected location

50. SOX

demand arrow
low Demand
Here's how SOX is used in Senior Information Security Engineer jobs:
  • Led quarterly Sarbanes-Oxley (SOX) Compliance internal risk assessments.

Show More

Senior Information Security Engineer Jobs

NO RESULTS

Aw snap, no jobs found.

20 Most Common Skills For A Senior Information Security Engineer

Ensure Compliance

10.9%

Information Security

10.1%

Vulnerability Assessments

8.1%

Firewall

8.0%

Infrastructure

6.4%

Security Policies

6.1%

Information Technology

5.9%

Architecture

5.2%

Assurance

4.3%

Incident Response

3.8%

Disa

3.8%

Risk Management

3.6%

Nist

3.4%

Cyber

3.4%

DOD

3.2%

Security Requirements

3.1%

Siem

2.9%

Network Security

2.8%

Intrusion Detection

2.7%

Fisma

2.4%
Show More

Typical Skill-Sets Required For A Senior Information Security Engineer

Rank Skill
1 Ensure Compliance 7.4%
2 Information Security 6.8%
3 Vulnerability Assessments 5.5%
4 Firewall 5.4%
5 Infrastructure 4.3%
6 Security Policies 4.1%
7 Information Technology 4.0%
8 Architecture 3.5%
9 Assurance 2.9%
10 Incident Response 2.6%
11 Disa 2.6%
12 Risk Management 2.4%
13 Nist 2.3%
14 Cyber 2.3%
15 DOD 2.1%
16 Security Requirements 2.1%
17 Siem 2.0%
18 Network Security 1.9%
19 Intrusion Detection 1.9%
20 Fisma 1.6%
21 Diacap 1.6%
22 PCI 1.5%
23 Risk Assessments 1.4%
24 Internet 1.3%
25 Mcafee 1.3%
26 Security Posture 1.3%
27 Security Tools 1.3%
28 Security Engineering 1.3%
29 ATO 1.2%
30 Nessus 1.2%
31 DLP 1.2%
32 Active Directory 1.2%
33 SME 1.1%
34 Security Assessment 1.1%
35 Linux 1.0%
36 Security Solutions 1.0%
37 IDS 1.0%
38 Ips 1.0%
39 POA 1.0%
40 VPN 1.0%
41 Arcsight 0.9%
42 Security Issues 0.9%
43 Access Control 0.9%
44 PKI 0.9%
45 Splunk 0.9%
46 Accreditation Process 0.8%
47 ISO 0.8%
48 Security Incidents 0.8%
49 Unix 0.7%
50 SOX 0.7%
{[{skill.rank}]} {[{skill.name}]} {[{skill.percentageDisplay}]}%
Show More

22,173 Senior Information Security Engineer Jobs

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.