Position Summary:
This role will be a core member of the Threat Team within the IT Security Team. This role will be responsible for responding to security alerts escalated from our SOC, contributing to structured threat hunts, and tracking vulnerabilities. The security engineer will also help tune detections and write playbooks to ensure the security team’s efforts are effective and efficient in reducing risk posted by threats. The successful candidate will interpret disparate data sources to understand the timeline of a security event.
Principal Responsibilities:
Monitor IT Security solutions for alerts, and when necessary, research and analyze available information to determine validity of alert and any actions to be taken
Interpret and act on results from various security technologies including SIEM, EDR, Firewall, Vulnerability Scan, etc.
Pivot between data sources during an investigation for deeper understanding of the event and exploration of other possible kill chains.
Maintain playbooks to document and standardize the team’s responses to security events.
Provide Incident Response (IR) support as needed.
Perform structured threat hunting driven by cyber threat intelligence.
Lead vulnerability assessments and security reviews through a comprehensive testing process to identify weaknesses and vulnerabilities within the systems that affect the confidentiality, integrity and availability of sensitive electronic company data.
Maintain up-to-date detailed knowledge of the IT security industry including awareness of zero-day vulnerabilities, and the development of other new attacks and threat vectors.
Support all other security initiatives as determine by need
Education, Experience, Skills and Abilities Requirements:
3+ years of IT Security related work, either as a primary or secondary job responsibility
Certifications will be considered in lieu of some experience: Security+, CySA+, GSEC, SSCP, or higher
Basic understanding of data analysis techniques is , including proficiency in at least one query language or scripting language
Understanding of at least one vulnerability scoring system
Ability to gather disparate data sources and extract the underlying story of a security event.
Understanding of or willingness to learn threat hunting and CTI foundations (e.g., PEAK Framework, Pyramid of Pain, analysis of competing hypotheses)
Demonstrates the organization’s core values, exuding behavior that is aligned with the firm’s culture.
1+ year of vulnerability management preferred but not
Special Working Conditions:
Maybe required to work on campus one or more times a week.
Click here for some insight into our culture!
The Baldwin Group will not accept unsolicited resumes from any source other than directly from a candidate who applies on our career site. Any unsolicited resumes sent to The Baldwin Group, including unsolicited resumes sent via any source from an Agency, will not be considered and are not subject to any fees for any placement resulting from the receipt of an unsolicited resume.