Threat Level: green Handler on Duty: Jan Kopriva

SANS ISC: InfoSec Jobs - SANS Internet Storm Center InfoSec Jobs

Participate: Learn more about our honeypot network
https://isc.sans.edu/honeypot.html

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Government Security - Information Security Engineer
Company Intel
Location Folsom, CA
Preferred GIAC Certifications GMON, GPEN, GCIH
Travel 10%
Salary Not provided
URL https://jobs.intel.com/ShowJob/Id/3314930/Government-Security-Information-Security-Engineer
Contact Name Anonymous
Contact Email donotemail/at/sans.edu
Expires 2022-06-04

Job Description

The IT InfoSec Government Security Solutions (GSS) Team is made up of highly experienced security professionals with skills ranging from solutions architecture and information security to application development and service operations. This cross-functional team is focused on supporting the unique IT information security and compliance requirements for Intel Federal LLC, a subsidiary of Intel, that delivers products and/or services to the US Government (USG).

In the Government Security Solutions Team, each person wears many hats and has multiple areas of expertise.

Our Team is looking for a talented and motivated individual with strong Information Security technical skills to rapidly learn and adopt new technologies. We are growing our On-prem and Cloud solution suite to meet US Government requirements for data safeguarding.

Our mission requires a continuous transformation of our current solutions to embrace a hybrid architecture in order to meet the growing demands of our business. We need your help to build and support secure and compliant solutions that will scale to meet the demand.

As part of your role you will:

Be part of an Agile team and be expected to monitor, support, and enhance the security posture of GSS solutions to maintain the compliance and security of Intel Federal capabilities.
Be responsible for the security event monitoring environment of our solutions. Including the definition, tuning, monitoring of the environment.
Ensure compliance with corporate cyber-security policies, USG regulations and standards.
Guide on the proper implementation and validation of security controls.
Work with customers and stakeholders to respond to security incidents and lead mitigation work to avoid repeat incidents.
In addition the ideal candidate should also exhibit the following behavioral skills:

Passion for Information Security
Customer service and stakeholder management skills, including experience in setting and managing user and stakeholder expectations - We partner closely with the IFL business teams to ensure we can prioritize and deliver key solutions to the business
Strong interpersonal, analytical, problem solving, negotiating, influencing, facilitation, organizational, prioritization, decision making and conflict resolution skills
Strong team player who works both independently and collaboratively with peers and teams

Qualifications


You must possess the below minimum qualifications to be initially considered for this position. Qualifications listed as preferred or additional will be considered a plus factor for applicants.

Minimum Qualifications:

Bachelor's degree in Computer Science, Information Security, or any other related Information Technology field
Minimum 3 years of experience with:

Windows security event log reviews and incident response workflows
Log monitoring, SIEM type solutions and workflows
Application security solutions (SAST, DAST)
Preferred Qualifications:

Experience with:

Linux and Cloud security event log reviews and incident response workflows
Quickly ramping in new security solutions - quickly applying trusted technologies across on-premise, cloud, and hybrid cloud environments.
Security controls design, evaluation and assessment
Threat hunting techniques and workflows
Script writing for automation and integration (e.g. PowerShell, .Net, Python, etc.)
MS Azure Government Cloud and Amazon Web Services GovCloud security solutions
Using Privilege Access Management (PAM) or similar tools.
Using Identity and Access Management solutions.
Datacenter hardware security operations like servers/hardware handling, installation, configuration, patching, decom and general security support
SAFe Agile framework in Scrum and Kanban methodologies to manage operations, engineering, and development workloads.
Security or Cyber certifications such as: CISSP, CISA, GMON, GPEN, GCIH, OSCP, etc.