Five Below: Information Security Engineer at Five Below (Philadelphia, PA) (Philadelphia, PA)

Posted: Feb 14, 2019

Position: Information Security Engineer

Report To: Director, Networking & Security


Position Summary:

The Information Security Engineer will be responsible for developing security standards, maintaining compliance with PCI and SOX requirements, and providing support for the firms global enterprise network. Information Security Engineer will provide technical expertise within the areas of threat management, incident response, forensics, and investigations.


The position requires the ability to analyze and interpret security incidents and drive outstanding incidents to closure. Key responsibilities include assisting in the day-to-day operations and monitoring of Five Below security applications including Security Incident and Event Management (SIEM) platform, endpoint protection (AV/ Anti-Malware), data loss prevention, intrusion detection/prevention systems, Network Access Control (NAC) and other commercial and open source security systems/applications.


Operations support includes the ability to create formal documentation and provide recommendations for security improvements. This role will require the individual to multitask and serve as a technical point-of-contact for information security related incidents. The role requires occasional off hours support and on-call rotation.

The candidate will actively collaborate with peers across technology to coordinate configuration changes, hardware/software upgrades and implementations as they relate to security initiatives. The candidate will have the opportunity to help shape the organizations security structure and incident remediation.


Qualifications:

    Exper
    • ience in the following areas required: Soft
    • skills required:Self-
      • motivated and able to work independently with little oversight to complete tasks and deliverables on time Able
      • to translate information security incident details into plain language for business stakeholders Abili
      • ty to articulate complex application architecture, configuration, and operation to others in both technical and non-technical terms Abili
      • ty to demonstrate troubleshooting skills, think analytically while working in a fast paced dynamic and growing IT environment and the flexibility to work with a wide range of technologies. Forwa
      • rd thinker who designs for not only current business needs but, plans for scalability and longer term solutions. Must
      • be able to multi-task and juggle multiple priorities while ensuring successful completion of all items in a timely fashion. Works
      • well with others and shows respect for their participation towards common goals Stron
      • g verbal and written communication skills required. Drive
      • s for results
    • 3+ years Administering, supporting, and implementing Windows client (Windows 7+) and server (2012+) computer systems
    • Knowledgeable in the following concepts/systems:
      • Assessing vulnerabilities on a host
      • Security Information and Event Management (SIEM)
      • Understanding SQL and Oracle databases
      • Windows Services
      • Linux-based operating systems
      • Understanding of PCI DSS and Sarbanes-Oxley (SOX) regulations and auditing procedures
    • 3+ years Administering, supporting, implementing, and continuous improvement of security solutions in at least 3 of the following areas:
      • Centralized Log Management
      • Information System Event Correlation
      • Secure E-mail Gateway
      • Host-based anti-malware or HIDS/HIPS
      • Network-based anti-malware or NIDS/NIPS
      • Vulnerability Management and Assessment
      • Secure Configuration Management
      • Network Access Control
      • Incident Management
      • Third Party Information Security Service Assessments
    • 3+ years as a Security Incident Handler or Security Analyst
      • Create and utilize incident response playbooks to follow established and repeatable processes for triaging and containment of an incident
      • Work with various stakeholders to ensure appropriate communication, coordination and closure of incidents
      • Actively contribute to the development and oversight of the enterprise security management strategy and framework
      • Experience with firewalls, NAC, PKI, identity and access management, IPS, Web Proxies, vulnerability management, file integrity monitoring, endpoint security platforms (AV, encryption, DLP, etc.)
      • Experience monitoring for policy violations or malicious activity and providing appropriate response and remediation. ¬†
      • Basic understanding of database administration (MS SQL, MySQL, Oracle).
      • Basic knowledge of scripting (Perl, Bash, Shell, etc.)
    Infor
    • mation Security best practices
    • Writing technical, procedural, compliance, and training documentation to be consumed by IT professionals, upper management, end users, and auditors
    • Experience/Education in these areas is a strong plus:
    • Bachelor's degree, or foreign equivalent, in Computer Science, Networking, Engineering, or a related technical field
    • A+, Network+, Security+, CCNA certification
    • Information Security Certifications from GIAC, Offensive Security, and/or Information System Security Certification Consortium (ISC)2
    • Understanding and knowledge of threat actor kill chain methodologies
    • Knowledgeable in malware forensics or reverse engineering malware
    • Knowledge of Technical Indicators of compromise sources and applications to information system data
    • Understanding of SANS, CIS, NIST, and/or ISO approaches to Information System Risk/Threat Management¬†


Job Responsibilities:

  • Triage and manage PCI and SOX Audits
  • Research and recommend security technologies and initiatives based on business needs and regulatory requirements (PCI, SOX, etc.)
  • Engineering and Administration of Information Security Tools
  • Development of Correlation use cases based on business needs and emerging threats
  • Stay aware of the developing threat landscape in order to proactively adjust tools
  • Develop information security policies and procedures
  • Analyze and respond to information security incidents sourced from the user community, log data, system data, host-based anti-malware systems, network-based antimalware systems, packet analyzers, traffic analyzers, and vulnerability data
  • Proactively identify, assess, and design remediation plan for risks and vulnerabilities in the network
  • Analyzing the current security architecture to identify weaknesses and develop opportunities for improvement
  • Communicate, implement, and maintain security policies and controls
  • Ensure security documentation is accurate and up to date
  • Provide expert level security support and counsel to other teams
  • Manage several vendor relationships
  • Other duties as assigned

Five Below is an Equal Opportunity Employer

More Information

Source: Stack Overflow


More Opportunities: