FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.
Sorry, we can't find that. Please try a different city or state.

Senior Security Engineer

This job has expired and is no longer available.
APPLY NOW
Apply Now
×
FIND
PERSONALIZED JOBS

Sorry, we can't find that. Please try a different city or state.

CONTENT HAS
BEEN UNLOCKED
Close this window to view unlocked content
or
find interesting jobs in

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign Up

SIGN UP TO UNLOCK CONTENT

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign up to save the job and get personalized job recommendations.

Sign up to dismiss the job and get personalized job recommendations.

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Already have an account? Log in

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Company Saved

Answer a few questions and view jobs at that match your preferences.

Where do you want to work?

Job Saved

See your Saved Jobs now

or

find more interesting jobs in

Job Dismissed

Find better matching jobs in

Your search has been saved!

Top 50 Senior Security Engineer Skills

Below we've compiled a list of the most important skills for a Senior Security Engineer. We ranked the top skills based on the percentage of Senior Security Engineer resumes they appeared on. For example, 9.2% of Senior Security Engineer resumes contained Firewall as a skill. Let's find out what skills a Senior Security Engineer actually needs in order to be successful in the workplace.

These are the most important skills for a Senior Security Engineer:

1. Firewall

demand arrow
high Demand
Here's how Firewall is used in Senior Security Engineer jobs:
  • Identified 3rd party company to assist with the deployment of Firewalls and to provide management/monitoring of locations after installation.
  • Implemented and enhanced performance of L3-4 firewall policy/ACL rules compilation and serialization.
  • Supported investigation of security violations and incidents using firewall logs.
  • Designed and implemented firewall log database in PostgreSQL.
  • Decreased firewall complexity by consolidating redundant rules.
  • Designed and implemented enterprise firewalls and TCP/IP schemes
  • Monitor security Appliance (Firewalls, Proxy, IPS, and Aruba Controllers) health checkup and acting on it appropriately.
  • Implemented FireMon and reduced the firewall rule-base by removing more than 10,000 unused rules in one year.
  • Provide hands-on Proof of Concept (POC) for firewall and Next Generation appliances.
  • Uploaded possible threats to firewalls on daily basis to block possible threats.
  • Test Central management system to manage Intrusion prevention systems and Firewall devices.
  • Engineered Data Center re-architecture for firewalls, IPS, and URL filtering.
  • Provided oversight, review and auditing firewall rule changes.
  • Provide Next Generation Firewall health check.
  • Designed traffic policies for the firewalls.
  • Build Firewall from base configuration to production config based on customer network and business requirements.
  • Report generation and Firewall rules modification through Tufin Secure Track.
  • Managed Linux IP Tables Firewalls and Pluggable Authentication Modules.
  • Facilitated the installation of Fortigatel/Fortinet firewalls at the Verizon hosted site.
  • Architected new security infrastructure with Next Generation Firewalls (Fortinet).

Show More

159 Firewall Jobs

No jobs at selected location

2. Vulnerability Assessments

demand arrow
high Demand
Here's how Vulnerability Assessments is used in Senior Security Engineer jobs:
  • Conduct network vulnerability assessments using tools to evaluate attack vectors, Identify System Vulnerabilities and develop remediation plans and Security Procedures.
  • Developed testing procedures for vulnerability assessments within Army networks utilizing Linux, Windows products, and various freeware scripting solutions.
  • Conduct risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs.
  • Performed vulnerability assessments, security testing, and working with operations and development teams on remediation and mitigation of findings.
  • Performed risk evaluation, system security audits, penetration tests and vulnerability assessments of the enterprise network.
  • Prepare application quality assurance reviews as well as perform vulnerability assessments in accordance with incident response plans.
  • Implemented security risk assessment methodology to system configuration, including threat model development, vulnerability assessments.
  • Integrated results from security vulnerability assessments with existing tools for defect reporting and metric tracking.
  • Performed and created procedures for system security audits, penetration-tests, and vulnerability assessments.
  • Coordinate application and infrastructure vulnerability assessments with vendors, clients, and internal groups.
  • Worked with clients to help in utilizing software to develop vulnerability assessments.
  • Performed vulnerability assessments on VOIP deployments.
  • Conducted vulnerability assessments on over 5000 + systems, 250 servers, 100 + databases, and over a dozen websites.
  • Performed penetration testing and vulnerability assessments by exploiting known vulnerabilities, using commercial and open source tools and utilities.
  • Conducted vulnerability assessments, penetration testing, and security audits for both internal systems and BellSouth customers.
  • Develop security plans and procedures for safeguarding classified information Conduct threat, and vulnerability assessments.
  • Performed security audits, penetration testing, and vulnerability assessments of new and existing systems.
  • Enhanced processes and procedures for vulnerability assessments to include writing SOPs and policy documents.
  • Performed extensive vulnerability assessments against client systems to ensure Federal Information Security Management Act (FISMA) and DITSCAP compliancy.
  • Performed network vulnerability assessments, ST&Es and system hardening.

Show More

37 Vulnerability Assessments Jobs

No jobs at selected location

3. Infrastructure

demand arrow
high Demand
Here's how Infrastructure is used in Senior Security Engineer jobs:
  • Participated in network infrastructure review process for customers which encompassed both local-area and wide-area network configurations.
  • Planned and established processes for testing and evaluating information security infrastructure and conducted simulations.
  • Created the security project plan including infrastructure, awareness, training and policy/procedure implementation.
  • Deployed Salt infrastructure for automation, patching, compliance and system configuration management.
  • Recommended improvements to network's security infrastructure to senior management.
  • Developed enterprise logging infrastructure of all network elements.
  • Participated in the implementation of SafeNet product for encrypting customer credit card information using Public Key Infrastructure (PKI).
  • Provided implementation, management, and troubleshooting support for file transfers in both Linux and Windows infrastructures.
  • Assist customers in the design and planning proposed changes to Security Infrastructure or Security Policy.
  • Allowed for the ability to move to a role-based security infrastructure.
  • Work on Network access managed by Active Directory Infrastructure.
  • Maintain and create documentation of the network infrastructure.
  • Certified the security of Citigroup IT Infrastructure.
  • Completed the rolling out the new version of the 7.1.6 BSM & SYSLOG Connector Agent to the IRS infrastructure.
  • Assist with Datacenter infrastructure documentation.
  • Network Engineer Maintain LAN/WAN infrastructure in a complex and multi-site network environment.
  • Provide DITSCAP compliance to Solaris infrastructure, BEA applications and integrated components.
  • Designed, architected and, implemented Shared Citi SOA Security Gateway Infrastructure using IBM WebSphere DataPower XI52 SOA Appliance.
  • Key Contributions: * Designed new inter-carrier MMS infrastructure that included geographic redundancy with automatic failover using an anycast address.
  • Designed new extranet infrastructure that included automatic failover between VPN's in two datacenters.

Show More

282 Infrastructure Jobs

No jobs at selected location

4. Ensure Compliance

demand arrow
high Demand
Here's how Ensure Compliance is used in Senior Security Engineer jobs:
  • Manage the implementation and enforces of organization s security policies and procedures, and audits to ensure compliance.
  • Conduct Security Assessments to ensure compliance with FISMA 2.0, ISO 27002, PCI, HIPPA and NIST standards.
  • Team leader) Leading of dedicated SOC team to ensure compliance to performance targets and overall customer satisfaction.

Show More

5. Security Policies

demand arrow
high Demand
Here's how Security Policies is used in Senior Security Engineer jobs:
  • Advise management officials on physical security related matters and communicate with team members regarding physical security policies, guidelines and initiatives.
  • Developed security policies and procedures relating to network access, acceptable use and software development.
  • Prepared security program guidelines, including security policies, and procedures and standards.
  • Help ensure security compliance of IT infrastructure, organizational security policies and standards.
  • Created, implemented and documented comprehensive security policies, standards and procedures.
  • Authored numerous department procedures and security policies in support of operations.
  • Established security policies and reviewed policies for validity and impact.
  • Provided Lead technical support in developing security policies.
  • Established baseline security policies for UNIX infrastructure.
  • Ensured all devices are approved via the security certification process prior to the deployment in accordance with security policies and standards.
  • Designed security policies, deployed and monitored core and edge network for suspicious activity using multiple SourceFire IPS appliances.
  • Support of existing security policies and procedures, as well as creation and implementation of new security procedures.
  • Led the delivery of C&A services in accordance with existing security policies and directives.
  • Develop, review and recommend changes to security policies designed to protect LASO and LANL information.
  • Implemented F5 Application Security Manager (ASM) web security policies for multiple applications.
  • Audited and updated Security Policies to conform to Red Flag Requirements.
  • Documented, designed, and implemented security solutions supporting customer requirements while adhering to security best practices and agency security policies.
  • Collaborated with Security Compliance to apply security policies for multi-national government security agreements based on the collected logging data.
  • Researched, analyzed and implemented cyber security plans/policies and created information security policies, standards, and processes.
  • Provided Information Security consultancy to business units Developed and implemented Information Security policies and standards.

Show More

59 Security Policies Jobs

No jobs at selected location

Job type you want
Full Time
Part Time
Internship
Temporary

6. VPN

demand arrow
high Demand
Here's how VPN is used in Senior Security Engineer jobs:
  • Delivered project management and design services to select customers VPN solutions.
  • Performed policy modification and rule changes on firewalls, including VPN, VLAN, route, and NAT changes.
  • Configured and maintained VPN tunnels as required by the business and maintain secure firewall routing tables.
  • Diagnose and resolve network issues locally, as well as at remote DMVPN and MPLS sites.
  • Managed the rule-base, implemented VPN's, and monitored alerts for system health.
  • Serve as lead on configuration and troubleshooting VPN's on all vendor firewall devices.
  • Integrated Cisco ACS Server, PIX, and RSA SecurID Appliance for VPN solutions.
  • Established and maintained multiple VPN connections between corporate headquarters and remote sites.
  • Integrate with network devices, systems and VPN logs.
  • Configure and troubleshoot VPN's on infrastructure VPN devices.
  • Set up site-to-site and remote access VPN tunnels.
  • Configure IPSEC VPN (Site -Site to Remote Access) on SRX series firewall.
  • Create a Visio diagram for VPN infrastructure, documents for 800 remote locations and document for VPN equipment.
  • Upgraded over 40 firewalls to the current 8.4 IOS Configured multiple site -to-site VPN tunnels for partner access.
  • Provided technical support for sales, and give technical sales presentations on designing secure networks with VPNs.
  • Set up IPSec VPN Site-to-Site connections across Cisco PIX firewall and Red Hat Enterprise Linux.
  • Configure and Support Cisco 3000 Series VPN concentrator for remote access VPN to Corporate users.
  • Configured site-to-site and client VPNs and identify and resolve firewall and VPN connectivity issues.
  • Migrated business partners from Nortel VPN over to Cisco RAS appliances.
  • Implement VPNs between customer and partners or remote access clients.

Show More

7 VPN Jobs

No jobs at selected location

7. Architecture

demand arrow
high Demand
Here's how Architecture is used in Senior Security Engineer jobs:
  • Assisted engineers as a security SME by providing secure architecture solutions incorporating security best practices.
  • Create and maintain comprehensive and current documentation on security system architecture and configuration.
  • Provided strategic direction to all engineering and deployment groups in adapting new architecture.
  • Developed, implemented and managed a technical review program of security architectures.
  • Designed and managed the implementation of a robust network and security architecture.
  • Evaluated security architectures and technical artifacts for direction and accuracy.
  • Analyze security architecture determining compliance and defense in depth requirements.
  • Analyzed AE's present architecture for security vulnerabilities.
  • Authored network diagrams detailing the new security architecture.
  • Possess an in depth knowledge of current LAN/WAN network technologies, architectures, principles, operations, and protocols.
  • Evaluated the security architecture standards, SDLC processes, and security, software and hardware components.
  • Managed all security teams working in the area of cloud and service oriented architecture security.
  • Performed as backup to IT-Security team to address security policy, incidents, and architecture.
  • Designed secure network architecture for a wide range of customers including fortune 500 companies.
  • Planned, installed, maintained, repaired, and audited security system architectures.
  • Evaluated and tested new technologies to fit into the existing security architecture.
  • Lead the development of security strategies, security roadmaps, architecture standards and operational procedures.
  • Embed security into the enterprise architecture and the system development lifecycle.
  • Assisted the lead in multiple windows security architecture projects, overseeing the windows security staff, engineers, analysts.
  • Collaborated with global Network, Platform, Engineering, and Dev teams around architecture design and review.

Show More

212 Architecture Jobs

No jobs at selected location

8. Information Security

demand arrow
high Demand
Here's how Information Security is used in Senior Security Engineer jobs:
  • Participate in development of information security architectural strategy, including security technology standardization and modernization.
  • Serve as representative of DAA and Site Manager on national level and interdepartmental information security boards and committees.
  • Experienced Information Security Consultant with experience in leading the Web Application Security and Vulnerability Management projects.
  • Provided feedback to management for ways to further enhance and improve overall Information security posture.
  • Evaluated emerging technologies related to information security and plans modifications to information security architecture.
  • Integrated information technology processes to resolve information security needs.
  • Develop and implement information security standards and procedures.
  • Provided remote information Security risk assessment of high risk and critical Third Party vendors including Cloud vendors utilizing Archer GRC system.
  • Assisted in the development and implementation of information security policies, laws, standards, and processes for corporate governance.
  • Serve as an internal information security consultant to the enterprise while balancing the needs of the day-to-day business operations.
  • Created, improved and enhanced the existing company information security policies, standards, and processes.
  • Communicate Information Security controls and requirements to Leadership, peers, customers and vendors.
  • Team lead for the Information Security Group (managed 6 engineers) 7.
  • Published information security articles, white papers, books, and related documentation.
  • Worked as Senior Information Security Consultant for ExtraTeam clients.
  • Apply knowledge of information security principles and practices.
  • Collect and analyze security requirements from internal customers; reconcile and remediate any conflicts with information security policies and standards.
  • Developed and reviewed cybersecurity requirements and impact plans for existing and emerging information security technology.
  • Provide cyber and information security consultation to businesses and support organizations through establishment and maintenance of the cyber security program.
  • Lead engineer in Enterprise Information Security Threat Intelligence Analysis and Reporting (eISTI).

Show More

159 Information Security Jobs

No jobs at selected location

9. Network Security

demand arrow
high Demand
Here's how Network Security is used in Senior Security Engineer jobs:
  • Performed network security consulting analysis that included monitoring of network infrastructures for vulnerabilities using network and host based intrusion detection systems.
  • Implemented and integrated new security solutions into existing customer network infrastructures and coordinate network security audits and changes with clients.
  • Solved network security issues, escalated by junior security members for their resolution.
  • Perform as a subject matter resource/authority/expert for the customer in network security incidents.
  • Drafted and edited prevailing internal regulatory compliance laws on email and network security.
  • Designed and implemented automated testing and deployment infrastructure for network security framework.
  • Provided solutions for physical security, network security and disaster recovery.
  • Designed network security using Checkpoint Firewall to secure the corporate networks.
  • Network Security, Security Operations, and Security engineering.
  • Assisted Network Operations Center with network security related troubleshooting.
  • Designed and configured network security and enterprise network monitoring.
  • Installed, maintained and monitored McAfee Network Security Platform and Network Security Manager (IPS) solution throughout the enterprise.
  • Designed the logical and physical network security infrastructure for their entire North America network expanding to 6 states.
  • Provided support and solutions to the enterprise network security infrastructure and methodologies to the JWAC and JFCOM Staff.
  • Develop comprehensive test scenarios and test cases covering the main functions on Network Security appliances.
  • Acted as lead engineer for the Network Security group including project planning and management.
  • Use appropriate and effective measures to respond to network security alerts.
  • Performed network security equipment repairs, installs, removals and upgrades.
  • Conducted Network security assessments for our large client base.
  • Perform testing on new network security technologies and appliances.

Show More

174 Network Security Jobs

No jobs at selected location

10. IDS

demand arrow
high Demand
Here's how IDS is used in Senior Security Engineer jobs:
  • Plan and assist with implementation of security infrastructure, including IDS/IPS, and vulnerability management tools.
  • Function as SME for IDS/IPS, infrastructure security configuration management, and vulnerability assessments.
  • Configured Cisco IDS using Cisco Security Manager Suite.
  • Designed and implemented Checkpoint security/management solutions (VPN, FW, IDS, floodgate, etc) for customers.
  • Performed continuous monitoring on existing infrastructure devices endpoints, firewalls, IDS, IPS, routers and switches.
  • Assist with management and development of security/privacy regulatory compliance, PCIDSS, State laws and best practices.
  • Monitored traffic using ISS SiteProtector IDS, CheckPoint firewall manager, and HP OpenView event management console.
  • Maintained updated knowledge of SNORT, Cisco MARS, ASA-IPS and other various IDS devices and tools.
  • Evaluated attack vectors from Bro IDS and other systems and lead the assessment and follow up.
  • Developed custom rules, scripts, and documentation for configuration of OSSEC IDS system.
  • Provide assistance to customers when troubleshooting problems that are potentially firewall or IDs related.
  • Lead Engineer for global enterprise Network Intrusion Detection System (NIDS) infrastructure.
  • Design and create policies for IDS and IPS devices for over 200 clients.
  • Full life cycle maintenance of firewall, IDS/IPS, and SIEM systems.
  • Manage SourceFire/Snort IDS/IPS systems, and assist in the IR/CIRT team investigations.
  • Designed IDS systems for the ExtraNet and DMZ segments.
  • Review IDS alerts and response.
  • Top Layer Security line of IDS & IPS.
  • Evaluated and recommended security applications (IDS/IPS, Malware protection and Firewalls).
  • Replaced Tipping Point and IBM Proventia IPS/IDS with Sourcefire appliances at the core and perimeter of the network.

Show More

18 IDS Jobs

No jobs at selected location

11. Ips

demand arrow
high Demand
Here's how Ips is used in Senior Security Engineer jobs:
  • Established and maintained business relationships with several groups external to Corporate Security.
  • Nurtured & cemented key partnerships with business critical industry vendors.
  • Maintained and monitored IDS/IPS systems for over 200+ co- and fully Managed Security Services (MSS) customers.
  • Traveled internationally to establish customer relationships with US Army leaders around the world.
  • Design and implement HP Tipping Point IPS and SMS solutions for Tier-0 infrastructures.
  • Established relationships with other teams within Kellogg IT and business partners.
  • Engineered IPS and AntiVirus solutions for over 20,000 endpoints.
  • Deployed and maintain IDS/IPS servers in a WAN environment.
  • Defined/tracked 'how to' documents for supported FW/IPS platforms.
  • Performed signature updates for multiple IDS/IPS platforms.
  • Provide high level support for FW/IPS platforms.
  • Perform installs, configure and troubleshooting on stateful inspection firewalls and inline/passive IPS/IDS sensors.
  • Managed and monitored HP TippingPoint IPS appliance for Coca-Cola enterprise network..
  • Created the FIPS 199 Categorizations, Privacy Impact Assessment, and Memorandums of Understanding (MOUs) and Interconnection Security Agreement.
  • Investigated and recommend network security technologies and best practices for firewalls, IDS/IPS, VPN, managed security services.
  • Cultivate relationships with team members, management, and government POCs through effective communication and leadership.
  • Experience in using Checkpoint IPS Blade module and Sourcefire IPS and Cisco 6500 ADSM module.
  • Implemented Sourcefire (Cisco) IDS/IPS system in B&D data center.
  • Automated firewall, IPS and DDoS device changes and deployments using web-based perl and bash CGI scripts.
  • Validate data using hash values through various tools like Syncback, IPswitch WS_FTP.

Show More

155 Ips Jobs

No jobs at selected location

12. Incident Response

demand arrow
high Demand
Here's how Incident Response is used in Senior Security Engineer jobs:
  • Authored virus incident management educational materials and training policies during service aiding in cross training of worldwide IBM incident response teams.
  • Participated in development of company standards for incident response procedures.
  • Managed incident response for both security incidents and network outages.
  • Provided 24x7 supports for production security systems, including incident response, performance tuning, troubleshooting, and problem resolution.
  • Developed a comprehensive incident response framework and led the first Computer Incident Response Team for the worldwide Navy Medicine Community.
  • Act as subject matter expert on Trend Micro Endpoint security products and team player on the Security Incident Response Team.
  • Provided consultation to clients in the areas of Endpoint Protection strategy, Incident Response process and Data Forensics collection.
  • Created and lead a team of Mobile Forensic Examiners and Developers for mobile incident response applications.
  • Managed process and acted in the lead role for computer security incident response team.
  • Established Computer Security Incident Response Team (CSIRT) based on NIST 800-61 guidelines.
  • Interfaced with global fraud teams to develop operational procedures to handle incident response.
  • Perform custom scripting in Python as requested for specific incident response scripts.
  • Generated alerts for Incident Response teams to act on as needed.
  • Integrated this system with Netflix's in-house automated incident response tools.
  • Lead Security Engineer in charge of Incident Response.
  • Assisted in incident response investigations to determine root cause and impact Conducted e-Discovery and forensic investigations as needed.
  • Participated in security incident response team activities, provided and implemented tactical risk mitigationto incidents.
  • Produced and maintained documentation for local EDS Herndon site and integrated within EDS Corporate Incident Response procedures and COOP activities.
  • Design Work Designed Enterprise Incident Response with MIR course.
  • Developed Incident Response plan for Willkie Farr.

Show More

185 Incident Response Jobs

No jobs at selected location

13. Nist

demand arrow
high Demand
Here's how Nist is used in Senior Security Engineer jobs:
  • Provided day to day firewall & security administration on all Department of State firewalls worldwide to include classified and unclassified departments.
  • Provide escalated support on security issues and guidelines to end-users, developers, and administrators.
  • Provide technical support for security administrators.
  • Supported bug tracking databases as administrator.
  • Developed, administered and managed a C&A monitoring program to safeguard and improve the security posture of the organization.
  • Manage and audit all efforts for the Certification and Accreditation of all CGDN+ components using DITSCAP and NIST 800-37 methodologies.
  • Conducted a policy gap analysis to determine policy areas that need updating to meet the requirements of NIST 800-53.
  • Managed vendors, administered and managed technical and information security programs, projects, and resources worldwide.
  • Updated configuration management plan template to ensure that it meets NIST 800-53 requirements.
  • Attained ForeScout Certified Administrator (FCSA) and Cisco CCNA Security certifications.
  • Administer daily access requests, security event reviews, creations and deletions.
  • Network administration to Windows NT/2000 servers running Exchange 5.5 and SQL 7.
  • Provide security engineering services for the Transportation Security Administration (TSA).
  • Develop and conduct security tests and evaluations based on NIST 800-53A.
  • Risk assessments according to NIST 800-60 and 800-53 recommendations.
  • Provide planning, budgeting and administrative support.
  • Generated interpretations of generic NIST and other controls to ensure testability and effectiveness.
  • Integrated with Safeword server to support OTP authentication for network device administration.
  • Administered WebDocs, Websphere MQ, ALDON, Trailblazer, DBU, TAATOOLS, and other third party software and utilities.
  • Implemented, and administer Bluecoat Web Content filtering Proxy for all locations.

Show More

24 Nist Jobs

No jobs at selected location

14. Checkpoint

demand arrow
high Demand
Here's how Checkpoint is used in Senior Security Engineer jobs:
  • Check Point Firewall policy management and policy auditing of installed checkpoint firewalls and VPN clients
  • Performed weekly backups and storage of Checkpoint management servers and firewall configurations.
  • Delivered skilled security management oversight and support of Checkpoint firewall platforms.
  • Provided technical support and management for USAID's Firewall and authentication (Checkpoint Firewall-1 & V-ONE SmartGate) technology.
  • Created company procedures governing Checkpoint and Cisco Pix firewall rule set implementation, auditing, management, and accounting.
  • Co-Designed a Checkpoint environment specifically for our company's M&A activity integration on Day ONE.
  • Assisted in an organizational transition from CheckPoint to Cisco ASA firewalls.
  • Configured Checkpoint Cluster XL, VRRP for redundant setups.
  • Upgraded the platforms using the checkpoint upgrade tools.
  • Patched and upgraded Checkpoint firewalls on Nokia IPSO.
  • Instructed CheckPoint, RSA and NetScreen classes.
  • Conducted periodic reviews of Checkpoint firewall policies rule base for rules consolidation and cleanup incoordination with stakeholders.
  • Configured Loglogic servers with Checkpoint firewalls as an OPSEC client to pull out firewall logs for customized reporting to upper management.
  • Provide the highest level of support on firewalls for outages (Cisco PIX, Juniper Netscreen, and Checkpoint).
  • Implemented and administered both CheckPoint and Cisco ASA firewalls, which included Cisco FirePOWER Services (formerly SourceFire IPS).
  • Worked on checkpoint UTM1, VPN1 and activating blade licenses to be used as Intrusion prevention and antivirus appliance.
  • Installed firewalls for several clients including Checkpoint Firewall-1, Cisco PIX, and Novell Border Manager.
  • Experienced with Checkpoint, Raptor, Cisco PIX, Sidewinder, SonicWall, Netscreen firewalls
  • Experience: Installed, upgraded and managed Checkpoint and Cisco ASA firewalls.
  • Created security rules for Intrasystems Managed Checkpoint firewalls and VPNs.

Show More

4 Checkpoint Jobs

No jobs at selected location

15. Assurance

demand arrow
average Demand
Here's how Assurance is used in Senior Security Engineer jobs:
  • Conducted security assurance audits at client sites to verify compliance with configuration management and physical security guidelines.
  • Assisted Software Development and Quality Assurance Engineers in the development and testing of Hercules Vulnerability Remediation product.
  • Provide Systems Engineering and Information Assurance Support to Classified computing environments as well as unclassified systems.
  • Provide security engineering expertise in all aspects of Information Assurance and Information Security Engineering.
  • Performed theoretical studies and laboratory experiments on information assurance technologies for the customer base.
  • Perform and document security control assessments and evaluations for information assurance solutions.
  • Handled duties temporarily as the Information Assurance Officer (IAO) for the Real-time Automated Personnel Identification System (RAPIDS).
  • Contracted out to USAITA Pentagon, Department of Army ITA/NISO, as a Senior Information Assurance Security Officer (IASO).
  • Provide guidance C&A / Information Assurance and support throughout the (systems development life cycle (SDLC))
  • Identified civil affairs projects to enhance construction goals, quality assurance and safety reports progress for all site visits.
  • Promoted to Information Assurance Manager (IAM) and Project Lead to oversee approximately 20 people in various positions.
  • Provide status and reported directly to the White House Director of Information Assurance (IA) Services.
  • Served as the Information Assurance Manager (IAM) for Army Reserve Command (USARC).
  • Support the integration of capability into the DCGS enterprise through interface with the information assurance community.
  • Provided solutions for software assurance at the speed of several highly aggressive agile development efforts.
  • Manage Information Assurance activities for three USMC applications (APES, PES and ODI-RMS).
  • Analyze customer's Information Assurance (IA) needs from the Enterprise perspective.
  • Performed and Supported Information Assurance (IA) support calls on weekends.
  • Collaborated with DEC on data interchange and information assurance work for AAMA.
  • Assisted with the quality control/assurance of all report deliverables as well as in-house training of co-engineers.

Show More

6 Assurance Jobs

No jobs at selected location

16. DOD

demand arrow
average Demand
Here's how DOD is used in Senior Security Engineer jobs:
  • Ensured technologies and system implementations met or exceeded Army and DoD policy requirements.
  • Reviewed system application IA controls, maintaining each application's security posture according to both DOD and FISMA requirements.
  • Lead IA point of contact with all DoD, Government and commercial customers on all Universal Consulting Services projects.
  • Perform independent verification and validation (IV&V), and independent audits on DODEA system and applications.
  • Develop and implement the IA solutions for DoD customers with sensitive data or systems, and stringent security requirement.
  • Configure, users, groups, roles, policies, SSL, encryption keys, DOD Certificate of Authority.
  • Assigned to Enterprise Management and Security Services Office, DoD, as an Accreditation & Risk Assessment Officer.
  • Understand the relation between DoD requirements and NIST Guidelines and apply them to PEO IEW&S systems.
  • Performed Certification and Accreditation of new system and re-Accredited older systems based on DoD and Army Policy.
  • Provide guidance on security matters in accordance to AR 25-2, 8500.2, and other Army/DoD regulations.
  • Project Management of a 20 person prime contract to perform facilities security for a DoD accredited SCIF.
  • Implement DOD Class3 PKI and provide technical support as LRA (Local Registration Authority).
  • Perform certification and testing activities on Department of Defense Intelligence Information Systems (DoDIIS).
  • Worked with Pentagon and AF Communications Agency on AF and DoD level policy.
  • Create policies and procedures within the division that reflects NIST and DODEA compliance.
  • Functioned as the IAO with permissions in the DoD Vulnerability Management System.
  • Reviewed and evaluated compliance with relevant DoDI 8500.2 IA controls.
  • Support DoD initiatives related to HBSS for ARCYBER.
  • Implement DOD mandated IAVA warnings and vender specific OS/app vulnerability release updates; patches.
  • Snort, Cisco IDS) Supported the building and design of DoD STIG compliant server farm environment for DoD clients.

Show More

9 DOD Jobs

No jobs at selected location

17. Intrusion Detection

demand arrow
average Demand
Here's how Intrusion Detection is used in Senior Security Engineer jobs:
  • Managed and supported additional security applications such as internal and external Intrusion Detection Systems utilizing Snort and Tripwire.
  • Developed, documented and implemented security best practices: incident response, vulnerability scanning and intrusion detection/analysis.
  • Analyzed, troubleshot, reconfigured and reprogrammed malfunctioning Wells Fargo CU-40 intrusion detection system in Djibouti.
  • Lead remediation activities stemming from security event analysis, vulnerability management and intrusion detection.
  • Implemented security controls such as web application firewalls, firewalls, intrusion detection/prevention systems.
  • Monitor security audit and intrusion detection system logs for system and network anomalies.
  • Design and configuration freeware Intrusion detection system.
  • Implemented and monitored Intrusion Detection/Prevention Systems.
  • Participated in the design and implementation of the intrusion detection and prevention system for the largest broadband network in the nation.
  • Coordinate maintenance of security-related systems (Anti-Virus, Patching, Intrusion Detection, Logging, Anti-spam, etc.)
  • Managed Intrusion Detection System Infrastructure on Red Hat Enterprise Linux 4 (RHEL 4) Platform.
  • Performed installation and configuration of ISS and Snort Intrusion detection systems at various customer sites.
  • Operate firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools.
  • Assisted with configuring and monitoring network intrusion detection systems (IDS) and firewalls.
  • Integrated network and information security tools including firewalls, routers, antivirus software and intrusion detection systems.
  • Designed a multi-layer security architecture involving PKI, intrusion detection and enterprise security management.
  • Designed and implemented intrusion detection architecture for multiple North American NOCs.
  • Conducted technical evaluations of INFOSEC tools such as Biometrics, Intrusion Detection Systems and Firewalls.
  • Designed and deployed the Enterasys Host Intrusion Detection system on Solaris, FreeBSD, Linux and Windows servers.
  • Maintained customer SEP Firewall, Intrusion Detection, Antivirus/Antispyware policies thorough the SEP Manager Console.

Show More

46 Intrusion Detection Jobs

No jobs at selected location

18. Security Requirements

demand arrow
average Demand
Here's how Security Requirements is used in Senior Security Engineer jobs:
  • Designed and implemented the application testing framework responsible for assessing application logic and validating security requirements throughout the software development life-cycle.
  • Provided guidance to customer liaisons, program/technical managers, and operations engineers regarding service connectivity, troubleshooting, and security requirements.
  • Analyze existing and future security appliances, reviewing security architectures, and collaboratively develop engineering solutions that integrate information security requirements.
  • Evaluated and developed enterprise-wide security requirements and security policies to achieve the target architecture in a spiral development environment.
  • Assisted the Department with security requirements to support proposed developmental programs, systems and networking environments.
  • Produce detailed functional and security requirements documentation for the Control, Audit and Security Branch.
  • Define non-functional security requirements for corporate technology projects; identify exceptions and articulate security gaps.
  • Developed security requirements for the J2EE implementation of the enterprise service oriented architecture initiatives.
  • Prepare reports on security incidents, system vulnerabilities, and compliance with security requirements.
  • Conducted detailed analysis of security requirements for new systems or modification to existing systems.
  • Analyze and define customer security requirements for Federal Agency networks and systems.
  • Prepared and executed system test plans with detailed security requirements.
  • Follow the security requirements of applicable policies and directives.
  • Enforced security requirements, policies, and procedures for projects to enhance the security posture of the business.
  • Design, develop, and implement solutions that meet FISMA and NIST security requirements.
  • Applied customer needs into security requirements based on security policy and DISA STIG guidelines.
  • Assist the ISSM in the identification of systems security requirements.
  • Worked with other engineering teams to ensurethat security requirements were satisfied for all projects.
  • Provided security requirements and enhancements to vendor's to improve the quality and controls of the products provided by them.
  • Architected and designed the development of security requirements analysis, multi-level security, wireless networks, and encryption.

Show More

60 Security Requirements Jobs

No jobs at selected location

19. Disa

demand arrow
average Demand
Here's how Disa is used in Senior Security Engineer jobs:
  • Experienced in developing and implementing disaster-recovery plans/contingency planning for WAN Systems operations and conducting security awareness and training.
  • Developed Incident Response Plan, Emergency Preparedness, Disaster Recovery, and Business Continuity Plan.
  • Provided information technology and information security technical insight and guidance to the DISA client.
  • Defined disaster recovery processes, and participated in recovery exercises.
  • Consult in preparation of disaster recovery and business continuity plans.
  • Created information security and disaster recovery plans for the business.
  • Create and re-engineer Business Continuity and Disaster Recovery Plans.
  • Designed and managed implementation of corporate Disaster Recovery site.
  • Prepared and update disaster recovery and contingency plan quarterly.
  • Participated in team disaster recovery drills.
  • Provide the RedSeal Networks staff members an understanding of the necessity to integrate DISA STIG requirements into their product.
  • Research, Scanning, Testing and evaluating several network system designs for conformity to NSA and DISA guidelines.
  • Reviewed the reports from Retina scans, DISA STIG and SRR compliance and provided guidance on appropriate mitigation.
  • Created and Managed disaster site recovery strategies, and Security Governance, Risk, and Compliance programs.
  • Provided guidance on vendor product submission for new products to be approved by DISA.
  • Participated in the yearly Disaster Recovery (DR) exercises to recover critical infrastructure.
  • Implemented IAVA resolutions and monitored the DISA Vulnerability Management System (VMS).
  • Prepared for audits and special disaster recovery requirements for Interagency and Basel 2/3.
  • Collaborated with DISA in the development of the Approved Vendor List and new vendor SRG/STIGs.
  • Support the IT Security Program to include configuration back-ups and disaster recovery plans and procedures.

Show More

4 Disa Jobs

No jobs at selected location

20. Juniper

demand arrow
average Demand
Here's how Juniper is used in Senior Security Engineer jobs:
  • Support, application delivery and optimization architecture using F-5, Riverbed, Blue Coat, Checkpoint and Juniper technologies.
  • Assist Engineering team to perform Root Cause Analysis (RCA) on issues experienced by customer on Juniper Devices.
  • Managed internal Checkpoint, Riverbed, and Juniper devices for remote office connectivity including VOIP using Cisco Infrastructure.
  • Implemented hybrid network solutions of Cisco and Juniper in staging for migrations to Juniper Platform.
  • Maintain the Juniper VPN and contribute knowledge in IS Security to the organization.
  • Escalate issues to and coordinate with the Juniper Technical Assistance Center.
  • Provide level 3 support for Checkpoint, Juniper and Cisco firewalls.
  • Configure Juniper firewalls as well as Cisco routing and switching hardware.
  • WAN Accelerator: Riverbed, Juniper WOC and WAAS implementations.
  • Implemented and supported firewalls ASA, Checkpoint and Juniper.
  • Replaced EOL event correlation utility with Juniper STRM.
  • Implemented Juniper SA700 SSL VPN.
  • Managed Checkpoint Firewalls using Multi SmartDomain Manager, Juniper with Network Security Manager.
  • Migrated juniper firewalls to Palo Alto network firewalls and carried out troubleshooting and configuration of the same.
  • Monitored and implemented security policies with both Juniper IDPs and Envision software programs.
  • Reviewed Syslog, Solarwinds and Juniper IDP logs to identify Intrusion and network problems.

Show More

21. System Security

demand arrow
average Demand
Here's how System Security is used in Senior Security Engineer jobs:
  • Briefed government components on system security educational training and awareness, and instructed users on the service provided security tools.
  • Executed physical and logical walk-downs, analyzing and capturing system security baselines, network topology, physical security.
  • Review information system security artifacts for accuracy, relevance, and compliance.
  • Developed system security plan and system testing strategy for payroll/personnel system.
  • Performed security monitoring of Intrusion Prevention Systems and system security events.
  • Conduct reviews to ensure compliance with the system security authorization agreements.
  • Perform system security testing and support for multiple projects simultaneously.
  • Support corporate security awareness programs, application/system security and hardening.
  • Perform application and system security administration.
  • Provided technical leadership to the DOD (Army and Air Force) for their ERP System Security Testing and Compliance Program.
  • Participate on Integrated Product Teams to ensure system security control requirements are understood and integrated into the system(s).
  • Coordinated system security remediation activities with the Information System Security Officer (ISSO) and other officials as required.
  • Developed System Security Plans (SSP) for cloud based platforms that required FISMA audit.
  • Conducted detailed system security assessments and independent verification and validation (IV&V).
  • Consulted with clients to conduct system security workshops and conduct threat assessment analyses.
  • Assist in the development and implementation of a system security design.
  • Developed system security standards using SANS guidelines and other sources.
  • Identified alternative vendor identity/authentication solutions to address organizational information system security design requirements for the enterprise portal architecture.
  • Prepare System Security Authorization Agreements (SSAAs) for systems planning to undergo Certification and Accreditation.
  • Developed System Security Plan's, (independent) Security Test & Evaluation reports and Security Assessment Reports.

Show More

31 System Security Jobs

No jobs at selected location

22. Linux

demand arrow
average Demand
Here's how Linux is used in Senior Security Engineer jobs:
  • Provided recommendations to Linux hardening guide for base systems and specific application servers.
  • Maintained internal Linux systems for development and internal product testing.
  • Delivered Linux system hardening and baseline documentation for productions servers.
  • Developed, implemented, and tested Linux C++ Security Design Architecture of an embedded system used in a Cross Domain Tactical Solution
  • Implement and maintain a change audit solution based on Tripwire for all production Linux and Windows systems.
  • Mentor and train junior staff in network, Linux and security concepts with no official budget.
  • Assign ratings to Microsoft, Linux, Oracle security notices and communicate them to management.
  • Hardened various platforms (desktop/servers and Blade technologies) and Windows and Linux operating systems.
  • Managed and troubleshot boot loaders on Linux platform (GRUB and LILO).
  • Worked in cross OS environment with Linux/Windows back ends.
  • Analyzed results and recommended remediation strategies for Physical servers and ESXi/Virtual Machines with Linux and Windows platform Operating Systems.
  • Created scripts using Shell Scripting and Java for automating the installation process of the product on Linux platform (Centos/RedHat).
  • Performed security gap assessments for storage device, UNITY in its operating system, database and linux server.
  • Analyzed Einstein Linux command log using rwfilter command to filter out specific traffic patterns.
  • Worked with various disciplines, Linux/Wintel, etc.
  • Managed multiple servers running Linux, Apache, MySQL, and PHP (LAMP) on RHEL 4 Platform.
  • Managed Linux package management with Yum, Pirut, and RPM on RHEL 4 Platform.
  • Red Hat Linux 6.4 Three Oracle [ ] databases and one Oracle 12c Oracle database.
  • Updated the Guardium software package profile for the installation of the Guardium service account for the Solaris and Linux database servers.

Show More

36 Linux Jobs

No jobs at selected location

23. Nessus

demand arrow
average Demand
Here's how Nessus is used in Senior Security Engineer jobs:
  • Performed penetration testing on FAA systems using NESSUS scanner and reviewed and reported on results.
  • Conduct vulnerability scans using NESSUS to scan the CMS QIO network infrastructure.
  • Assess client networks using NESSUS and RETINA vulnerability scanners.
  • Developed Nessus plugins and compliance checks to automate verification of Secure Configuration Management compliance for which no SCAP exists.
  • Implemented Custom SSL WebCertificates and PIV Card Authentication (2-factor authentication) for SecurityCenter and Nessus.
  • Provided implementation/configuration and maintenance of agency sponsored tools (Tenable Nessus and IBM AppScan standard)
  • Perform and analyze scheduled vulnerability scans on production network using the vulnerability scanner Nessus.
  • Conduct internal penetration tests using Nessus and generate reports.
  • Deployed Tenable Nessus vulnerability scanning tool.
  • Use tools such as: Nessus, WebInspect, Fortify, and Retina to perform vulnerability assessment on existing and new systems
  • Used Snort, Nessus, and Security Center to monitor and investigate security issues on the corporate network.
  • Perform vulnerability scans to comply with IAVA compliance using STAT, ISS, Retina, and Nessus.
  • Provide vulnerability assessments, network scans, and asset mapping using Nessus and Retina.
  • Introduced and produced manuals for running Nessus and ISS BlackICE.
  • Developed custom NASL plugins and compliance checks for Nessus.
  • Performed regular security vulnerability scans using assessment tools such as Nessus and nmap.
  • Performed eEye Retina, Nessus and DISA Gold Disk scans on all platforms, remedied and addressed POA&M findings.
  • Utilized Cybercop, Nessus, Sniffer Pro Wireless, and NMAP to perform security audits and analysis.
  • Oversee and perform regular patch maintenance with tools such as Nessus/Security Center and Bigfix.
  • Utilize multiple security assessment tools (WASSP/SECSCN, eEye Retina, Nessus, RAT, SCC, etc.)

Show More

27 Nessus Jobs

No jobs at selected location

24. PCI

demand arrow
average Demand
Here's how PCI is used in Senior Security Engineer jobs:
  • Developed requirements and business justification for auditing tools in support of PCI compliance.
  • Integrated Tripwire Enterprise and Tripwire Log Center to display correlation rules in a custom dashboard for customers and internal PCI infrastructure.
  • Completed PCI certification with QSA, working with multiple teams to redesign, segment, and validate controls.
  • Projected cost and budget savings by establishing risk mitigation of penalty fees for non-compliance to PCI standards.
  • Assisted financial business partners and led information systems and security resources in 2015 to achieve PCI certification.
  • Instituted Sarbanes-Oxley and PCI DSS compliance, as well as a comprehensive information security strategy.
  • Lead & support ongoing PCI and SOC 2 audits for the Worldwide commercial environment.
  • Streamlined daily business applications and policies; achieved and maintained PCI /SOX/HIPAA compliance.
  • Coordinate and conduct interviews for SOX audit and PCI DSS Level 2 validation.
  • Review PCI change requirements and assist Change Review team with PCI compliance.
  • Completed certifications as a PCI auditor and VISA Payment Application assessor.
  • Implemented logging in support of PCI compliance (KIWI).
  • Audited firewall configurations and policies in compliance with PCI.
  • Generate compliance audits for SOX/PCI recertification.
  • Audit and maintain security devices (SSL VPN, 2Factor Auth, RADIUS) and provided appropriate documentation for PCI.
  • Selected Achievements Brought company into compliance with Sarbanes-Oxley and PCI DSS in fourteen months.
  • Engineer firewall policies in compliance with Centurylink security policies, PCI, and SOX.
  • Performed quarterly security audits and maintain compliancy (PCI).
  • Implemented Snare syslog solution for SOX and PCI systems.
  • Configure and secure VLANs with PCI device connectivity.

Show More

1 PCI Jobs

No jobs at selected location

25. Siem

demand arrow
average Demand
Here's how Siem is used in Senior Security Engineer jobs:
  • Implemented and maintain log management using ArcSight SIEM, Juniper STRM, Cisco MARS to detect threats and potential risks.
  • Reviewed technical specifications for SIEM, logging and proposed recommendations to improve the overall deployment of the solution.
  • Performed the review of a newly implemented Security Incident and Event Management (SIEM) system.
  • Provided 24x7 support for security alerts, investigation and threat remediation (SIEM).
  • Maintain Enterprise log management using RSA Envision SIEM for detection of potential threats.
  • Developed correlation rules for Security Incident and Event Management (SIEM) system.
  • Design and deployed Security Information & Event Management (SIEM) platform.
  • Create SIEM content rules, catalog & classify data sources and types.
  • Participated in Siemens Habitat for Humanity and Light the Night activities annually.
  • Installed and configured ArcSight ESM SIEM software for tracking security events.
  • Deploy LogRhythm for SIEM (Security Information & Event Management).
  • Respond to and investigate SIEM alarms.
  • Designed and implemented ArcSight SIEM.
  • Managed Firewall, IPS, DLP, NAC, MVM and SIEM policies.
  • Architected multiple projects to include global web proxy redesign, global SIEM deployment, and global deployment of advanced APT appliance.
  • Install and configure the Qradar SIEM including all its components, local & or remote log collectors.
  • Hired to become the Subject Matter Expert on a semi-deployed IBM QRadar (SIEM) system.
  • Analyze existing syslog-ng implementation to create collection statistics to model and validate SIEM design.
  • Manage and tune QRadar SIEM.
  • Introduced vulneability management and SIEM (security information and enterprise management) solutions.

Show More

101 Siem Jobs

No jobs at selected location

26. ASA

demand arrow
average Demand
Here's how ASA is used in Senior Security Engineer jobs:
  • Gained expert knowledge of Cisco routing and switching; installed and configured the above Cisco ASA hardware at various sites.
  • Manage, monitor, configure Cisco ASA 5500-x firewalls and Cisco IPS SSP/SSM to prevent and detect real-time intrusions.
  • Design the firewalls rules on Cisco ASA 5520 and 5540-X and implemented the different NAT policies.
  • Installed and managed Cisco Security Manager to centrally manage Cisco ASA firewalls and VPN devices.
  • Implemented all security controls and traffic flow analysis for Cisco ASA and Check Point devices.
  • Participated in system design, configuration, installation, troubleshooting of Cisco ASA Firewalls.
  • Configured, Tested, and Deployed Cisco ASA HA Firewalls across multiple power facilities.
  • Manage project task to migrate from Cisco ASA firewalls to Check Point firewalls.
  • Migrated the Cisco ASA firewalls from version 8.2 to 8.6.
  • Added two Cisco ASA5540 firewalls with IPS cards.
  • Handled deployment and management Checkpoint GAIA, R75, R71, R65 and Cisco ASA 5500 series.
  • Set up Cisco ASA 5505, 5510 and 5540.
  • Implemented Cisco ASA configurations to support remote access Virtual Private Networking (VPN) using the Cisco AnyConnect Secure Mobility Client.
  • Hired initially as a consultant to migrate an acquired company from Checkpoint NG firewalls to Cisco ASA's.
  • Migrated existing vendors off the obsolete Cisco 3000 vpn platform onto the new Cisco ASA5540.
  • Configured, monitored and troubleshoot Cisco's ASA 5500 security appliances, failover DMZ Zoning.
  • Experience with Cisco ASA and Palo Alto Networks Firewalls.
  • Upgrade all 30 Cisco ASA firewalls from 8.2.4 code to 9.1.6 code/ 7.4.3 ASDM.
  • Manage Cisco ASA's, VPN, and Palo Alto FW's.
  • Managed the core and perimeter firewalls which included cisco 5510, 5520 ASA as well as Sonicwall NSAE-7500 series appliances.

Show More

8 ASA Jobs

No jobs at selected location

27. Mcafee

demand arrow
average Demand
Here's how Mcafee is used in Senior Security Engineer jobs:
  • Performed Vulnerability Scans using McAfee Found Scan Monitoring all security audit logs on MS Windows and Unix-based servers/systems.
  • Utilize threat intelligence such as McAfee Global Threat Intelligence (GTI), global and local reputations.
  • Managed McAfee HIPS threat dashboards to provide relevant information to appropriate IT personnel.
  • Deployed McAfee Device Control agent to 5000 workstations and monitored the events.
  • Team Lead for McAfee Data Loss Prevent (DLP) technology.
  • Served as Project Manager for the McAfee Channel SE Program.
  • Worked jointly with McAfee partners to develop Security focused solutions.
  • Subject Matter Expert for deployed McAfee solutions.
  • Install and configure McAfee endpoint Encryption.
  • Team Lead for McAfee Host IPS Solution.
  • Deployed HDLP and NDLP to several Non-Government sites Help deploy McAfee MOVE, Web Gateway to NON-Government sites
  • Monitored McAfee's rogue system detection and remediated discovered devices.
  • Manage McAfee EPO5 Antivirus System.
  • Performed daily log review of McAfee ePO logs as well as identified/remediated compromised hosts from a variety of log sources.
  • Set up user access policies for servers, devices, Mcafee NSM and Sourcefire DC.
  • Submit malware samples to McAfee Labs for further analysis and inclusion in their DATs.
  • Evaluated and Tested latest products such as Rapid 7/Metasploit to possibly replace Mcafee.
  • Design and train customers with the McAfee management ePolicy Orchestrator.
  • Administer McAfee ePolicy Orchestrator to provide policies for antivirus clients and to provide reports for remediation.
  • Design Sourcefire, Fireeye, Netflow monitoring, Fortinet solutions, McAfee.

Show More

31 Mcafee Jobs

No jobs at selected location

28. Information Technology

demand arrow
average Demand
Here's how Information Technology is used in Senior Security Engineer jobs:
  • Provided security architectural management, expertise and life cycle support for NASA HQ Information Technology department.
  • Assist in the development and execution of the enterprise information technology risk management program.
  • Manage Certification and Accreditation process for over 85 Information Technology Assets for duration of system life cycle.
  • Assist clients in the development of information technology policies, standards, processes, and procedures.
  • Facilitated interviews held with Aetna information technology personnel.

Show More

23 Information Technology Jobs

No jobs at selected location

29. Fisma

demand arrow
average Demand
Here's how Fisma is used in Senior Security Engineer jobs:
  • Assisted Federal and commercial clients in development of documentation and reporting data for annual FISMA reporting requirements.
  • Lead & support ongoing ATO support for the US Federal environment; Includes both FISMA 800.53 and FedRAMP audit activities.
  • Lead Engineer on a number of platforms (PAAS) that required FISMA accreditation by implementing a detailed security plan.
  • Review client FISMA tool reviews and recommended FISMA survey additions to simplify the users experience.
  • Leverage Policy Auditor to ensure FISMA, NIST, and patching requirements are meet.
  • Monitored, tracked, and managed FISMA compliance for the Secure Flight Program.
  • Web Server hardening to comply with FISMA and NIST standards.
  • Develop policies to support FISMA certification and compliance.
  • Provided input for the FISMA Audits.
  • Perform FISMA and FISCAM Self-Assessments.
  • Tested against NIST 800-53 from Rev1 to Rev3 for FISMA and OMB compliance.
  • Support FISMA, OIG and OMB A-123 Financial Audits.
  • Assisted in FISMA and Cybersecurity Cross Agency Priorities data collection as related to enterprise architecture and boundary protection initiatives.
  • Provided auditable evaluation documentation in the form of reports and checklist for FISMA requirements.
  • Well versed in the use of CSAM V2 and V3., and Trusted Agent Fisma (TAF).

Show More

20 Fisma Jobs

No jobs at selected location

30. Internet

demand arrow
low Demand
Here's how Internet is used in Senior Security Engineer jobs:
  • Performed Risk Management services for commercial clients to include various financial institutions and Internet and Application Service Providers.
  • Defined and implemented internet firewall architecture requirements for accreditation.
  • Designed and implemented Internet filtering using WebSense.
  • Evaluated and deployed SSL and IPSEC VPN to allow secure remote access, trading, and financial transaction over the Internet.
  • Set up VPN with business clients to provide secure connection over the Internet for FIX connectivity.
  • Promoted from Internet Services Group where I was a network/security engineer to corporate security.
  • Monitored Intrusion Prevention Device, Firewalls, and Internet Proxies for abnormal network events.
  • Worked with Internet Engineering team in the design and configuration of BlueCoat Internet proxy.
  • Design and implementation of NFUSE for use via the internet.
  • Develop, implement and maintain information security systems for both USinternetworking's internal systems and client data protection.
  • Provide management, administration and monitoring services to bluecoat internet proxy infrastructure.
  • Performed troubleshooting and resolution on complex internetwork systems.
  • Configured, maintained and provided 24x7 support for all security devices, server load-balancing, network switches/routers and internet circuits.
  • Experienced in using Wireshark and IE Watch to troubleshoot internet access issues.
  • Managed the security infrastructure of multiple Internet and Extranet access points.
  • Performed troubleshooting and resolution on complex internetwork systems, including Juniper, Cisco, Citrix, and Arista.
  • Architected secure network design for various internal company's Internet Data Centers/POPs/IAC/VHOs/SHOs.

Show More

1 Internet Jobs

No jobs at selected location

31. Security Solutions

demand arrow
low Demand
Here's how Security Solutions is used in Senior Security Engineer jobs:
  • Work collaboratively with security engineers to integrate security solutions into the Enterprise architecture in accordance with NIST 800.53 controls.
  • Team Leader responsible for designing and implementing complete security solutions security audits and penetration tests for Fortune 100 companies.
  • Implemented multiple network security solutions within the organizational data centers according to the ITIL Services framework.
  • Reviewed security solutions to ensure compliance with corporate information security policies, standards and practices.
  • Worked with third party vendors to deploy appropriate security solutions for vulnerability scanning and management.
  • Provide information security solutions to various network and application development teams on key initiatives.
  • Provided guidance for implementing cost-effective, practical security solutions to reduce identified risks.
  • Apply security design principles to develop security solutions that aligned to security architectures.
  • Provided objective, third party security solutions to e-commerce and internet-based businesses.
  • Direct decision-making input regarding selection and implementation of enhanced security solutions.
  • Provide operational oversight of vendor's performance in managing security solutions.
  • Developed and implement security solutions in Medium and Enterprise accounts.
  • Recommended and managed IT Security solutions for contract.
  • Offered Cloud Security Solutions and managed RSA authentication.
  • Implement security solutions, or work with vendor partners to implement solutions per the organization's change management process and procedures.
  • Worked with security vendors to work out costs and obtain quotes for new security solutions and renew existing product licensing.
  • Support the maintenance and deployment of new security solutions in multiple data centers.
  • Created and Launched the Security Solutions group within CSI from the ground up.
  • Designed and implemented various end-point security solutions such as Tripwire, Pointsec encryption, and application white listing from Bit9.
  • Present, advise, design, and architect security solutions such as Advanced Malware, APT, Anti-virus/Anti-Malware.

Show More

201 Security Solutions Jobs

No jobs at selected location

32. Active Directory

demand arrow
low Demand
Here's how Active Directory is used in Senior Security Engineer jobs:
  • Led deployment of user provisioning for Kraft International, administrating Microsoft Active Directory and Sun Identity manager tools.
  • Designed and implemented McAfee s first enterprise wireless network using Active Directory based x.509 client certificate authentication.
  • Key Player in Successful Common Criteria Evaluation of Microsoft Active Directory Federated Services.
  • Integrated user authentication and authorization with the enterprise Active Directory where possible.
  • Verified all systems from active directory have SEP installed by using a PowerShell script to compare AD to the SEP database.
  • Communicate with various groups on projects, applications and systems that will authenticate to Active Directory while providing security services.
  • Integrated OracleHR system with NetIQ DRA to implement automated Active Directory account creation and deletion.
  • Audited Active Directory accounts and rights.
  • Played a key role in the Ft. Huachuca campus network infrastructure migration from Windows NT to Active Directory.
  • Provide Security Engineering Services to an Army Active Directory OOBM/Virtualization project and assisted with the design.
  • Retail and City Government Clients Active Directory server migration planning.

Show More

21 Active Directory Jobs

No jobs at selected location

33. RSA

demand arrow
low Demand
Here's how RSA is used in Senior Security Engineer jobs:
  • Developed and oversaw implementation of database encryption for sensitive data.
  • Monitored the RSA SecurID logs for unauthorized access attempts then researched and reported these findings when they accrued.
  • Initiated, oversaw and completed a number of compliance and engineering projects designed to enhance the security platform.
  • Configured, tested, and deployed rules and policies to maintain and improve HRSA Systems Security Posture.
  • Provide design, implementation, and support of RSA Data Loss Prevention suite within the Enterprise.
  • Test for future deployment a one-time password solution based on RSA Secure-ID.
  • Acted as world-wide escalation point for all RSA SecurID/Forefront Edge escalations.
  • Configured and managed RSA dual factor authentication on multiple Linux servers.
  • Proposed and delivered on large managed RSA strong authentication with ADP.
  • Deployed the RSA SecurID token for the Private Bank business.
  • Track down targeted attacks and defend against active adversaries.
  • Architected the security solution and oversaw the implementation of security controls.
  • Provide user and technical support for the RSA token access and the Citrix Virtual Desktop Infrastructure (VDI) layout.
  • Managed Devices: Palo Alto Firewalls McAfee Enterprise firewalls McAfee Web Gateway Proxy RSA Archer

Show More

34. Cyber

demand arrow
low Demand
Here's how Cyber is used in Senior Security Engineer jobs:
  • Established internal system and network technical online repository via creation and management of Cybersecurity Round Table for system and network engineers.
  • Maintain deep understanding of information technology networking and infrastructure, particularly as they pertain to network and cyber security.
  • Supported cyber security initiatives through both predictive and reactive analysis, articulating emerging trends to leadership and staff.
  • Prepare detailed written documentation for technical briefings to senior government officials involving operations of cyber security activities.
  • Analyzed user needs and requirements to plan system architecture supporting cybersecurity operations.
  • Assisted in defining and implementing CSU's overall technical cyber security architecture.
  • Provided Cyber Security Training for Sales personnel.
  • Serve as primary Cyber Security POC supporting multiple US Patents and Trademarks Office (USPTO) Financial Systems.
  • Assisted in the design and implementation of a Cyber Threat Analysis database prototype for the Strategic Player program.
  • Analyze operational reports received from other Cyber services to develop operational metrics, trends, and briefs.
  • Evaluate and coordinate customer compliance with United States Cyber Command (USCC) orders & directives.
  • Performed and stayed abreast of the latest Cyber Security and malicious threats in the wild.
  • Coordinated with law enforcement agencies on some reported cases of cyber crime.
  • Audit & report risk and cyber security threats to senior management.
  • Provide technical support to the LANS Cyber Security Team.
  • Managed the Operational Assurance & cyber Security Practice.
  • Created organizational cyber policies based on NIST Special Publication 800-53 and related documents.
  • Integrated the platform into QRadar and developed number of use case rules based on Cyber Kill Chain model.
  • Give presentations and consultation on APT, cyber-intelligence, Malware kill chain, and big data.
  • Designed and developed Organization's Cyber Threat Map using the logs from QRadar SIEM.

Show More

85 Cyber Jobs

No jobs at selected location

35. Access Control

demand arrow
low Demand
Here's how Access Control is used in Senior Security Engineer jobs:
  • Received letter of accommodation for identifying major access control flaws in a financial support system.
  • Work with the installation teams, on the testing of the readers and doors associated with installed/programmed access control card readers.
  • Performed disk management on Linux servers (user quotas, disk partitioning, permissions, and access control lists).
  • Deployed enterprise security solutions such as McAfee HBSS, PKI Smart Cards, Encryption technology and Network access controls.
  • Designed and implemented secure Information Systems (IS) with advanced access control and intrusion detection capabilities.
  • Implement network security best practices including; access control lists (ACL), and VLAN segregation.
  • Subject matter expert tasked with performing site surveys, assisting in installations of access control devices.
  • Manage and generate certificates for systems including servers, Wireless LAN Controllers and Access Control.
  • Network Access Control (NAC) implementation, testing, and design.
  • Maintain DMZ servers, filtering packets, and access control lists.
  • Defined and implemented access control for different network admin groups.
  • Access control: Policies and deployment methodologies for HID card readers, biometrics, cipher-locks.
  • Maintain MDI system while being replaced with the installation of C*Cure iStar access control system.

Show More

4 Access Control Jobs

No jobs at selected location

36. Splunk

demand arrow
low Demand
Here's how Splunk is used in Senior Security Engineer jobs:
  • Increased response time to certain email based incidents by 96% using innovative techniques developed in the Splunk log management solution.
  • Created a reviewed report based on event anomalies and exported all logs from systems and networks into Splunk for security analysis.
  • Configure and tune customized Splunk Enterprise Security alerts, adhering to the requirements of the Home Depot Environment.
  • Assist in policy creation for Splunk, as well as redefining matrix needed to prioritize incoming threats.
  • Utilize Splunk to analyze logs from various tools to detect anomalies and troubleshoot issues.
  • Worked on project to deploy a global monitoring and analysis suite using Splunk.
  • Experience in Monitoring Tools such as Splunk and HP OPENVIEW.
  • Implemented monitoring solution, and built problem notification system using Logicmonitor and Splunk.
  • Led Proof-of-Concept evaluations of Cisco Web Security (Cloud-Based Web Proxy), zScaler Web Proxy, and Splunk SIEM technologies.
  • Experience working on network monitoring tools like, SOLAR WINDS, CISCO works, Wireshark and Splunk.
  • Deployed two Splunk Apps for NOC to monitor denied firewall logs and DDoS mitigation logs.
  • Use LDAP for identifying user groups Created and configured management report and dashboards using Splunk.

Show More

88 Splunk Jobs

No jobs at selected location

37. Diacap

demand arrow
low Demand
Here's how Diacap is used in Senior Security Engineer jobs:
  • Develop security documentation as required by DoD Information Assurance Certification and Accreditation Program (DIACAP).
  • Designated as Certification Authority CA for United States Forces Afghanistan (USFOR-A) making DIACAP accreditation recommendations to the DAA.
  • Review all documents provided by System Owner to decide between a System or Application process for DIACAP or No DIACAP.
  • Develop, update, and maintain appropriate Certification and Accreditation (C&A) packages based on DIACAP.
  • Perform Security Engineering, Implementation, & DIACAP of multiple systems on both NIPR& SIPR networks.
  • Led over 30 DIACAP certification efforts for type accredited systems and Army base installations.
  • Perform Security Engineering assessments and recommendations under the DIACAP program for Army G-5 systems.
  • Developed documents using DITSCAP and DIACAP and tailored the process to the organization.
  • Performed and maintained DITSCAP/DIACAP C&A for enterprise information systems.
  • Worked on assessments of C&A packages for DIACAP approval.
  • Support routine DoD compliance activities such as DIACAP and IAVA.
  • Create and develop DIACAP documentation and implement DIACAP controls.
  • Provide personalized Cyber Security, DIACAP and Information Assurance training to fortune 500 corporate IT groups.
  • Develop and maintain POA&Ms for several DITSCAP/DIACAP projects.

Show More

2 Diacap Jobs

No jobs at selected location

38. Risk Assessments

demand arrow
low Demand
Here's how Risk Assessments is used in Senior Security Engineer jobs:
  • Conduct and document risk assessments and mitigation strategy recommendations.
  • Conducted vulnerability-risk assessments as directed by the client.
  • Conducted IT security risk assessments including, threat analysis and threat modeling (STRIDE, DREAD).
  • Drafted appropriate risk assessments for potential application, network, or switching and routing security threats.
  • Supported key project risk assessments that allow the government program office to develop mitigation plans.
  • Risk Management: Performed detailed risk assessments using a customized GRC tool.
  • Develop user specifications and risk assessments for SSA Security Team.
  • Created and edited executive summaries, risk assessments, POA&Ms for FAA systems.
  • Performed formal risk assessments in accordance with NIST [ ] Provided mentorship to four junior Network Analysts and Engineers.

Show More

4 Risk Assessments Jobs

No jobs at selected location

39. PKI

demand arrow
low Demand
Here's how PKI is used in Senior Security Engineer jobs:
  • Set up, administered, and managed Entrust PKI servers, digital certificates, LDAP servers, and X.500 directory servers.
  • Key contributor in the installation, configuration, and maintenance of the servers that operate the CA and associated PKI architecture.
  • Key team lead of the regular generation, revocation and suspension of certificates and maintenance of specific PKI certificates.
  • Contributed to the development of the PKI team strategy, technical standards, and implementation guidance.
  • Designed and supported various end-to-end secure architecture IPTV domains, including DRM/PKI standards.
  • Authored several PowerShell automation programs for the PKI team required tasks and responsibilities.
  • Train new employees on PKI and system functions.
  • Designed and managed McAfee s enterprise PKI.
  • Designed and deployed multi-level security technology such as Public Key Infrastructure (PKI) and two factor authentication.
  • Lead team in configuration, installation and implementation of Lumeta IPSonar, to include configuration of PKI certificates.
  • Integrate BEA Weblogic servers, to PKI; LDAP, web servers, sun IDM, Siteminder and Oracle.
  • contract cancelled) Responsible for providing application engineering and integration support for managed PKI and Identity Management client services.

Show More

43 PKI Jobs

No jobs at selected location

40. SSL

demand arrow
low Demand
Here's how SSL is used in Senior Security Engineer jobs:
  • Entrust certificates were utilized for web server SSL support also business application user authentication and transaction signing.
  • Managed network connectivity and network SSL Security, between Head offices and Branch office.
  • Deployed VPN for corporate users with Checkpoint SecureClient and SSL VPN.
  • Manage all VeriSign SSL certificates for corporate and production use.
  • Configure EX4200 virtual-chassis switches, MX80 routers, SRX 240, 3400's and SSL-VPN SA4500's along with Cisco switches.
  • Provided detailed security design and best practices to migrate the acquisition network seamlessly into the McGraw Hill environment.
  • Worked on RSA Secur ID System and tokens and SSL/VPN in Cisco ASA.
  • Whale eGapRemote Access Appliance: Supported all aspects of Microsoft's eGap including installation and configuring the eGap SSLVPN security appliance.

Show More

24 SSL Jobs

No jobs at selected location

41. Arcsight

demand arrow
low Demand
Here's how Arcsight is used in Senior Security Engineer jobs:
  • Monitor and support operational health of ArcSight ensuring performance and availability to analysts.
  • Research and develop content for ArcSight ESM, including correlation rules, dashboards, reports, and visualizations.
  • Participate as a technical SME and company representative for technical advisory boards for ThreatStream and HP ArcSight.
  • Created IRS ESAT ArcSight SOP documents for the ESAT ArcSight errors and troubleshooting guide for ArcSight support.
  • Implemented the new process to fine tuning the test and deployment process for the ArcSight connector agents.
  • Worked on the HP ArcSight Connector to connect and pull data from ArcSight product using API.
  • Created the ESAT ArcSight Connector agent requirements for integration with the HP OpenView application monitoring.
  • Installed, configured and maintained the ArcSight tool for a Government agency.
  • Manage the technical relationship between HP ArcSight and Experian- finding and tracking more than 50 product bugs.
  • Gained expertise in ArcSight as a primary tool to gather information from the network via syslog's.
  • Developed custom .NET solution to pull reports out of ArcSight and deliver to end users.
  • Used Arcsight to monitor for network anomalies using event correlation techniques from multiple log sources.
  • Completed the development for IEM software package profiles for ArcSight and Guardium agents.
  • Major projects: Implemented McAfee ePO Implemented ArcSight 4.0
  • Developed custom flexconnectors for Arcsight integration of custom devices and various mainframes.
  • Supported in the implementation of projects such as Host Based Security System, Webwasher (Web Proxy), and Arcsight.
  • Defined all of the ArcSight audit files modifications and ArcSight process monitoring for the Solaris/Linux OS.
  • Created custom Arcsight collectors for non-standard logs to feed Arcsight logger and ESM.
  • Created Tivoli tasks to check for ESAT Arcsight requirements for Solaris 10, Linux 5.X/6.X and Window 2003/2008 OS.

Show More

14 Arcsight Jobs

No jobs at selected location

42. SME

demand arrow
low Demand
Here's how SME is used in Senior Security Engineer jobs:
  • Planned and performed security assessments on designated technologies and systems by using tools and other methods including interviews.
  • Provide technical expertise and support to staff by performing risk assessments and implementation of security procedures and products.
  • Conducted technical security assessments and recommend security upgrades to deter terrorism and technical espionage.
  • Perform security, testing, and evaluation assessments of information assurance solutions between components.
  • Write extensive documentation of customer actions, including assessment results and configuration documentation.
  • Engineered training and assessment visits during military exercises.
  • Developed base templates and assessment for Federal and commercial customers to use in the phases of the Risk Management Framework.
  • Revised and improved MS Access database tool used during assessments as a data collection and data analysis tool.
  • Risk assessment on the application by identifying the issues and prioritizing the issues based on risk level.
  • Conducted interviews with technical and non-technical personnel as part of the information gathering and assessment phases.
  • Assist with performing risk assessments of new and existing services, applications, and devices.
  • Project lead for performing NIST/FISMA system authorizations and assessments for Federal and commercial clients.
  • Trained clients and team members on Application Security Assessments and Penetration Testing.
  • Provide Subject Matter Expert (SME) on IBM WebSphere DataPower Appliance.
  • Coordinate with McAfee SME regarding malicious events detected by McAfee host products.
  • Detailed data risk assessment on all data within the organization.
  • Conducted mock risk assessments based on NIST 800-53.
  • Conducted departmental risk and compliance self assessment.
  • Conduct onsite audits and assessments of contractor information systems on behalf of government customer according to government standards and polices.
  • Utilized CSAM (Cyber Security Assessment and Management) software for management of security related system documents and POA&Ms.

Show More

8 SME Jobs

No jobs at selected location

43. Symantec

demand arrow
low Demand
Here's how Symantec is used in Senior Security Engineer jobs:
  • Redesigned and implemented Symantec End Point protection.
  • Implement Minimum Security Baselines using the Symantec Control Compliance Suite for Windows Servers, SQL and Oracle Databases and Linux Servers.
  • File Integrity Monitoring - Infrastructure Operations and Administration of Symantec Data Center Security Server, SCSP, Tripwire.
  • Build and maintain key relationships with other Symantec support groups to facilitate client interaction outside the MSS business.
  • Purchased Symantec Endpoint, setup central console, deployed client to all workstations and servers.
  • Maintain virus protection for all servers and workstations across the enterprise using tools from Symantec.
  • Interfaced with 3rd party Managed Security Services support (Symantec and FishNet Security).
  • Implement and manage Data Loss Prevention platform (Symantec DLP).
  • Deployed and troubleshot installations of Symantec CSP HIDS.
  • Designed and implemented Symantec DLP.
  • Designed, implemented and provide operational support of Symantec/Vontu Enterprise Data Loss Prevention solution to protect corporate confidential data.
  • Installed Symantec antivirus on workstation and server levels.
  • Worked with developers to have Delta Airlines applications submitted to Symantec to be whitelisted to avoid any issues during deployment.
  • Oversee the MSSP in regards to managing Symantec EndPoint environment, including project management for SEP transition project.
  • Major Accomplishments Successful implementation of the Symantec Endpoint Protection client to over 300,000 severs and endpoints.
  • Installed Symantec IT Analytics to be able to create consolidated reports from all SEP sites.
  • Integrated Symantec Data Loss Protection (Vontu) and SSO solutions integrated for enterprise accounts.
  • Provide onsite Symantec DLP technical service and support to a Large Enterprise customer base.
  • Installed and configured Symantec raptor firewalls .Reviewed the client's needs and created a rule set based on those needs.
  • Implement and maintain Venafi Certificate Management Platform Responsible for maintaining the enterprise endpoint protection sofware by Symantec.

Show More

44. SOC

demand arrow
low Demand
Here's how SOC is used in Senior Security Engineer jobs:
  • Network and application security assessments on complex corporate systems using Black Hat/White Hat and social engineering techniques.
  • Provided Tier III SOC escalation support and post-sales customer integration with Counterpane's security monitoring platform
  • Evaluate and recommend new technologies to support GSOC operations and incident response/detection.
  • Design and implement alerting mechanisms and associated policy planning and application strategies.
  • Contract I provided technical supervision of the Transportation Security Administration (TSA) Security Operation Center (SOC).
  • Provide tier3 support for network operations in a 24x7 NOC/SOC shift environment for the National Guard Bureau.
  • Set up Secure Sockets Layer (SSL) communication between I Planet and the WebLogic Application Server.
  • Evaluated various vendor solutions for SOC (Security Operations Center) and endpoint monitoring systems.
  • Provide security awareness training to clients regarding the areas of phishing and social engineering.
  • Implement and maintain various VPN solutions (IPSEC/SSL) for clients & associates.
  • Recruited to build out and support security for the cellular and associate network.
  • Participate in many security associations, including CSI, ISSA and SANS.
  • Develop use cases in support of GSOC operations and business unit requirements.
  • Managed the project plan and all associated work breakdown structures.
  • Developed Vulnerability Intelligence process to prevent and mitigate risk associated with new security threats and exploits in a timely manner.
  • Identify information security risks associated with the solution, and provide compensating mitigations where necessary.
  • Designed metrics and methodologies for DHS and state exercise planning teams, to quantify interdependencies and associated cascades i.e.
  • Coordinated weekly tuning engagements with the SOC to reduce noise and false indicators.
  • Integrated solution with Symantec SOC, outsourced monitoring and alerting system.
  • Worked in IPCore NOC and SOC as a Tier III Engineer.

Show More

45. Security Assessment

demand arrow
low Demand
Here's how Security Assessment is used in Senior Security Engineer jobs:
  • Conducted Vulnerability and Security Assessments for Data Protection tools using enterprise standard framework to optimize maximum efficiency.
  • Conducted internal and external Security Assessments and Network and Wireless Penetration testing.
  • Performed comprehensive security assessments of identified and applied security controls.
  • Performed wireless audits; external security assessments of client.
  • Develop security assessment evaluations for corporate enterprise solutions.
  • Conducted security assessments and architectural reviews.
  • Conduct security assessments & ethical hacking.
  • Conducted security assessments for various applications supporting Corporate & Investment Banking, Loan, Treasury, Equities and FI businesses.
  • Compiled the results and findings into a final Security Assessment Report, along with assessments and recommendations for remediation.
  • Tailor Security Assessments to each individual client needs to ensure that all relevant standards are applied.
  • Managed security assessments for various types of Operating Systems (O/S) used by the firm.
  • Reviewed security infrastructure, including IPS, IDS, log management, and security assessment systems.
  • Complete security assessments on various platforms including web applications, mobile apps and internal systems.
  • Conducted physical security assessments, lead engineering activities, conduct site interviews, etc.
  • Review baseline security assessment (BSA) with customers.
  • Reviewed Firewall rules for Security Assessment and violation of Commonwealth Policies Performed Security Architectural Design for new Products and services.
  • Project Manager on Vendor/Product evaluations Performed Security Assessment for new technologies within Commonwealth network.
  • Performed security assessments, review documentation, and support security the ISSOs and CA in a team of technically diverse personnel.
  • Provide Security Assessment and Authorization (SA&A) and Certification and Accreditation support to Federal and Com- mercial clients.
  • Conduct security assessments and independent evaluation and validation (IV&V) of system components and subcomponents.

Show More

10 Security Assessment Jobs

No jobs at selected location

46. Security Engineering

demand arrow
low Demand
Here's how Security Engineering is used in Senior Security Engineer jobs:
  • Perform information systems security engineering to integrate required security characteristics and requirements into the performance objectives of the selected system.
  • Perform Security Engineering tasks for Managed Security Services customers to include: Configuration Audits and installation/maintenance of security devices.
  • Led and managed several security engineering projects and provided projects with support by leading security architecture and engineering consultation.
  • Mentored junior security engineers to increase their understanding of complex security engineering.
  • Maintained network security infrastructure and led wireless technical security engineering projects.
  • Provided high quality security engineering leadership and guidance in Information Security.
  • Manage work requests related to security incidents and security engineering services.
  • Managed all security engineering projects and requests for eight engineers.
  • Promoted out of Security Operations Center to Security Engineering.
  • Provide and drive certification and accreditation expertise and security engineering efforts for PEO IEW&S systems using the RMF processes.
  • Provide 24/7 technical support for managed security services, security engineering, infrastructure, management, and sales groups.
  • Performed full system life cycle security engineering for a Microsoft Windows NT/2000 network for DISCAP accreditation.
  • Conduct security engineering, analysis, and testing of customer networks and systems.
  • Perform security engineering reviews for systems pertaining to US VISIT.
  • Led a security engineering group on the z/OS/MVS mainframe platform.
  • Provided Security Engineering services to Army BRAC sites.

Show More

240 Security Engineering Jobs

No jobs at selected location

47. F5

demand arrow
low Demand
Here's how F5 is used in Senior Security Engineer jobs:
  • Deployed BIG IP Enterprise manager to cluster all the F5 LTM, GTM, devices for easier management and common configurations.
  • Installed and Configured the F5 BIG-IP LTM, configured virtual servers and associate them with pools for Internal web servers.
  • Implemented security feature integration between F5 Big-IP and cloud based DDOS mitigation SilverLine product using REST JASON API call.
  • Help the NOC team to configure the servers, networking and F5 configuration and patches.
  • Worked on F5 BIG-IP LTM 8900, configured profiles, provided and ensured high availability.
  • Design and Architecture of F5LTM, GTM, APM, ASM and application delivery network.
  • Performed implementation and support of F5 Big-IP LTM/GTM devices for system load balancing.
  • Lead Engineer in design and configuration of F5.
  • Involved in migration of F5 LTM 5100 series to LTM 8950 series.
  • Migrated Cisco ACE LB to F5 LTM VE
  • Configured High availability and implemented it on F5Load balancer.
  • Installed high availability Big IP F5 LTM and GTM load balancers to provide uninterrupted service to customers.
  • Attended BlueCoat, Aveska, and F5 LTM training.
  • Worked closely with the networking team to configure F5 load balancer to route requests to the Weblogic and Apache/Tomcat server.
  • Subject matter expert in F5 LTM, GTM, ASM, WAM, Link Controller, iControl, and iRules.

Show More

8 F5 Jobs

No jobs at selected location

48. Security Issues

demand arrow
low Demand
Here's how Security Issues is used in Senior Security Engineer jobs:
  • Coordinated internal and external corporate security issues dealing with APD Offerings with the internal Corporate Information Security Team.
  • Conduct weekly physical security inspections on facilities and make suggestions to improve or correct security issues.
  • Communicated and documented security issues; wrote agency policy and decision papers.
  • Interacted with Auditors on security issues encountered on audit reviews.
  • Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access.
  • Responded to all security issues sent into mailbox and referred questions not being able to handle to third parties.
  • Reviewed and analyzed the findings that identify security issues on the system.
  • Worked to consolidate the worldwide corporate security issues under one umbrella.
  • Assess threats, risks, and vulnerabilities from emerging security issues.
  • Provide 24x7 global supports for troubleshooting network and security issues.

Show More

92 Security Issues Jobs

No jobs at selected location

49. Ipsec

demand arrow
low Demand
Here's how Ipsec is used in Senior Security Engineer jobs:
  • Trained customers on products, secure VPN network design using IPSEC, X.509 Certificates and Certificate Authorities.
  • Design and implementation of IPSEC network encryption for corporate offices and 40 remote branches.
  • Perform troubleshooting on hardware, IPSEC, LAN/WAN network, and Security issues.
  • Maintained IPSEC and SSL VPN infrastructures for corporate users and B2B data communications.
  • Configured Client VPN technologies including Cisco's VPN client via IPSEC.
  • Configured and maintained IPSEC, SSL Decryption, high availability, port mirroring, SSL VPN's on Palo Alto Firewalls.
  • Negotiate VPN tunnels using IPSec encryption standards and also configured and implemented site to site VPN and remote VPN.
  • Convert Branch WAN links from TDM circuits to MPLS and to convert encryption from IPsec/GRE to Get VPN.
  • Configure virtual routers, zones, IPSEC, static routing, OSPF using Palo Alto firewalls.
  • worked with sites to support DNS, DHCP, and Active Directory over VPN solutions using IPsec point-to-point tunnels over PPTP.
  • Configured, modified and troubleshoot IPSEC site-to-site VPNs and IPSEC/SSL client VPNs.

Show More

50. Unix

demand arrow
low Demand
Here's how Unix is used in Senior Security Engineer jobs:
  • Develop tools and automation scripts with Perl and bash to automate security configuration requirements for Windows and Unix/Linux systems.
  • Authored and maintained Windows Server, Windows Desktop, Macintosh and UNIX security baseline guidance for NASA HQ system implementations.
  • Administered customer configurations and Python scripting within a Unix(FreeBSD) CLI.
  • Managed project for System Hardening of Unix and Windows servers.
  • Created, implemented and deployed the Guardium STAP Agents for (Linux & UNIX) across the across the enterprise.
  • Implement Tripwire, SSH, and Syslog-ng, S/Key login over LDAP authentication for Unix and NT servers.

Show More

10 Unix Jobs

No jobs at selected location

Senior Security Engineer Jobs

NO RESULTS

Aw snap, no jobs found.

20 Most Common Skills For A Senior Security Engineer

Firewall

14.1%

Vulnerability Assessments

9.4%

Infrastructure

8.9%

Ensure Compliance

8.0%

Security Policies

5.8%

VPN

5.3%

Architecture

5.0%

Information Security

4.7%

Network Security

3.8%

IDS

3.7%

Ips

3.7%

Incident Response

3.6%

Nist

3.3%

Checkpoint

3.2%

Assurance

3.2%

DOD

3.1%

Intrusion Detection

2.9%

Security Requirements

2.8%

Disa

2.7%

Juniper

2.6%
Show More

Typical Skill-Sets Required For A Senior Security Engineer

Rank Skill
1 Firewall 9.2%
2 Vulnerability Assessments 6.1%
3 Infrastructure 5.8%
4 Ensure Compliance 5.2%
5 Security Policies 3.8%
6 VPN 3.4%
7 Architecture 3.2%
8 Information Security 3.1%
9 Network Security 2.4%
10 IDS 2.4%
11 Ips 2.4%
12 Incident Response 2.4%
13 Nist 2.2%
14 Checkpoint 2.1%
15 Assurance 2.1%
16 DOD 2.0%
17 Intrusion Detection 1.9%
18 Security Requirements 1.8%
19 Disa 1.7%
20 Juniper 1.7%
21 System Security 1.6%
22 Linux 1.6%
23 Nessus 1.6%
24 PCI 1.5%
25 Siem 1.5%
26 ASA 1.5%
27 Mcafee 1.4%
28 Information Technology 1.4%
29 Fisma 1.3%
30 Internet 1.2%
31 Security Solutions 1.2%
32 Active Directory 1.2%
33 RSA 1.1%
34 Cyber 1.1%
35 Access Control 1.1%
36 Splunk 1.1%
37 Diacap 1.1%
38 Risk Assessments 1.1%
39 PKI 1.0%
40 SSL 1.0%
41 Arcsight 1.0%
42 SME 1.0%
43 Symantec 1.0%
44 SOC 0.9%
45 Security Assessment 0.9%
46 Security Engineering 0.9%
47 F5 0.9%
48 Security Issues 0.9%
49 Ipsec 0.8%
50 Unix 0.8%
{[{skill.rank}]} {[{skill.name}]} {[{skill.percentageDisplay}]}%
Show More

26,175 Senior Security Engineer Jobs

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.