Sr. Information Security Engineer Engineering - Oak Brook, IL at Geebo

Sr. Information Security Engineer

Hub Group offers comprehensive transportation and logistics management solutions.
Keeping our customers' needs in focus, Hub Group designs, continually optimizes, and applies industry-leading technology to our customers' supply chains for better service, greater efficiency, and total visibility.
As an award-winning, publicly traded company (Nasdaq:
HUBG) with nearly $5 billion in revenue, our 6,000 employees across North America are always in pursuit of The Way Ahead - a commitment to service, integrity and innovation.
For more information, visit hubgroup.
com.
Job SummaryThe Sr.
Information Security Engineer is responsible for investigating and resolving security incidents detected by security technologies or reported by other sources.
The Engineer will manage the event collection functions as well as other security technologies to maintain and improve the security posture of Hub Group.
Essential Job Functions Work with the Information Security Team to improve the security for the company by configuring and administering security systems and tools.
Analyze system and application event logs to detect security vulnerabilities or malicious activity.
Investigate security incidents independently to determine root cause and remediation tactics.
Automate security monitoring and remediation processes.
Administer log collection services including syslog-ng and ensuring system and application event logs are forwarded to aggregators.
Prepare and analyze security incident and event data for monthly and quarterly reporting.
Perform security scans of the network devices, systems, and applications.
Design and implement security solutions for cloud and on-premise systems.
Proactively research to identify and understand new threats, vulnerabilities, and exploits.
Work with external resources involved in the performance of security penetration testing.
Periodically test and evaluate Information Security controls to assure compliance with policies.
Ability to think strategically and evaluate options in the short, medium and long term.
Strong planning and organizing skills including the ability to manage several work streams simultaneously.
Excellent communication skills, both in writing and verbally.
Clear decision-making ability with the facility to judge complex situations and assess when to escalate issues.
After-hours configuration changes and on-call support required.
Duties, responsibilities, and activities may be assigned or changed from time to time.
Minimum Qualifications Bachelor's degree in Computer Science, Information Systems (or related degree), or equivalent experience.
5
years of experience working with enterprise Information Security technology Expertise in security log monitoring as well as incident response Expertise in event log management and collection.
ELK experience is a plus.
Expertise in implementing SOAR technology (Phantom, Demisto, FortiSOAR, etc.
) Expertise in scripting in languages such (Python, Perl, Powershell, bash, etc.
) Experience with Microsoft Office365 Security (MCAS, Email ATP) Experience with malware investigations and remediation Experience scripting with APIs Experience with vulnerability scanners (Qualys, Tenable, Nexpose, Metasploit) Experience managing mobile devices using an MDM or UEM.
Experience with Windows, MacOS, and Linux operating systems, virtualization, containers, and cloud technologies.
Proficient in Microsoft Office application such as Microsoft Outlook, Word, Excel, PowerPoint, and SharePoint.
CompTIA Security+, CCNA Security, CISSP, CEH, OSCP, and/or related certifications are preferred.
Flexibility to travel when required.
Recommended Skills Api Apple Ios Automation Bash (Scripting Language) Certified Ethical Hacker Certified Information Systems Security Professional Apply to this job.
Think you're the perfect candidate? Apply on company site Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.