Security Tools Engineer, Encryptionother related Employment listings - Seattle, WA at Geebo

Security Tools Engineer, Encryption

Company Name:
Kalles Group

Join a renowned information security team with highly-skilled, collaborative practitioners using the latest tools working to bring information security to the next level across our technical and cultural environment. We recognize that information security is not an end in itself. It's a service to the consumer and to business, we are building security into everything we do as an organization.
The Security Tools Engineer, Encryption technologies administers, configures, maintains, and implements security solutions in a multi-platform environment (Windows, Unix/Linux, mobile.) Focus areas may include file encryption or application and file encryption tools such as Vormetric, Safenet, and Microsoft Secure File Server.
The security tools engineer will become a recognized leader in cutting edge enterprise information security disciplines in the Seattle market.


What We Do

Ensure systems and sensitive information are protected from internal and external unauthorized access, modification, deletion or disclosure in compliance with major industry policies, standards, and security best practices.
Designing, map, configure, and implement security solutions for various commercial information security tools aligning with business requirements appropriate per accepted risk level.
Work with a variety of security efforts that span application and network level initiatives.
Partner with Network, Application, DevOps, and Systems Engineers and Architects as well as impacted business units as a technical advisor and champion of your domain in information security. Provide guidance to security analysts, project managers, and engineering units on your tool's configuration, functionality, and environmental impact.
Assess and identify attack vectors. Bring additional control to the threat surface area and mitigate vulnerabilities through suggesting and implementing appropriate tool thresholds and building additional capability.

What We've Done

Hands on installation, configuration and support of security related hardware and software such as Certificate Management, Enterprise Anti-Virus/Malware, Data Loss Prevention, File Integrity Monitoring, Security Auditing, and Vulnerability Management applications and systems.
Passion about new technology and motivation to drive it from ideation through deployment and integration to fully automated and operationalized security asset.
Some basic automation knowledge for integration, data collection, scripting and reporting tasks.
Knowledge or work in incident response activities for network intrusions, virus infections, and internal security violations.
Knowledge or work assessing risks and providing innovative countermeasures and solutions that balance security and business requirements.

Qualifications

Significant information security experience on Windows, Unix, and Linux platforms.
Significant IT infrastructure or networking proficiency and experience that could include one or more of: Encryption, Tokenization, Forensics/eDiscovery, Penetration Testing, Firewalls (OS, WAF), Proxies, Routers, Gateways,
Foundational understanding of several enterprise environment technologies including servers, databases, wired an wireless WAN/LAN, applications, services, and hybrid platforms.
Understanding of some of the controls and policy standards in our current legal and regulatory environments such PCI, SOX, HIPAA, GLBA, NIST, or others.
Penetration Testing experience a plus.
CISSP or other industry certifications a plus.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.