Job Description :
POSITION: Information Security Engineer
Contract 12+
Philadelphia, Pennsylvania

Major skills:
Crowd Strike
Black Barbon Projtect
Sox Compliance
ISO 27001 Knowladge of framework

Experience in the following areas required:
o 3+ years Administering, supporting, and implementing Windows client (Windows 7+)
and server (2012+) computer systems
o Knowledgeable in the following concepts/systems:
Assessing vulnerabilities on a host
Security Information and Event Management (SIEM)
Understanding SQL and Oracle databases
Windows Services
Linux-based operating systems
Understanding of PCI DSS and Sarbanes-Oxley (SOX) regulations and auditing

o 3+ years Administering, supporting, implementing, and continuous improvement of
security solutions in at least 3 of the following areas:
Centralized Log Management
Information System Event Correlation
Secure E-mail Gateway
Host-based anti-malware or HIDS/HIPS
Network-based anti-malware or NIDS/NIPS
Vulnerability Management and Assessment
Secure Configuration Management
Network Access Control
Incident Management
Third Party Information Security Service Assessments
o 3+ years as a Security Incident Handler or Security Analyst
o Create and utilize incident response playbooks to follow established and repeatable
processes for triaging and containment of an incident
o Work with various stakeholders to ensure appropriate communication, coordination
and closure of incidents
o Actively contribute to the development and oversight of the enterprise security
management strategy and framework
o Experience with firewalls, NAC, PKI, identity and access management, IPS, Web Proxies,
vulnerability management, file integrity monitoring, endpoint security platforms (AV,
encryption, DLP, etc
o Experience monitoring for policy violations or malicious activity and providing
appropriate response and remediation.
o Basic understanding of database administration (MS SQL, MySQL, Oracle
o Basic knowledge of scripting (Perl, Bash, Shell, etc
o Information Security best practices
o Writing technical, procedural, compliance, and training documentation to be consumed
by IT professionals, upper management, end users, and auditors

Soft skills required:

o Self-motivated and able to work independently with little oversight to complete tasks
and deliverables on time
o Able to translate information security incident details into plain language for business
o Ability to articulate complex application architecture, configuration, and operation to
others in both technical and non-technical terms
o Ability to demonstrate troubleshooting skills, think analytically while working in a fast
paced dynamic and growing IT environment and the flexibility to work with a wide range
of technologies.
o Forward thinker who designs for not only current business needs but, plans for
scalability and longer term solutions.
o Must be able to multi-task and juggle multiple priorities while ensuring successful
completion of all items in a timely fashion.
o Works well with others and shows respect for their participation towards common goals
o Strong verbal and written communication skills required.
o Drives for results
Experience/Education in these areas is a strong plus:
o Bachelor39;s degree, or foreign equivalent, in Computer Science, Networking, Engineering,
or a related technical field
o A+, Network+, Security+, CCNA certification
o Information Security Certifications from GIAC, Offensive Security, and/or Information
System Security Certification Consortium (ISC) 2
o Understanding and knowledge of threat actor kill chain methodologies
o Knowledgeable in malware forensics or reverse engineering malware
o Knowledge of Technical Indicators of compromise sources and applications to
information system data
o Understanding of SANS, CIS, NIST, and/or ISO approaches to Information System
Risk/Threat Management

Triage and manage PCI and SOX Audits
Research and recommend security technologies and initiatives based on business needs and
regulatory requirements (PCI, SOX, etc
Engineering and Administration of Information Security Tools
Development of Correlation use cases based on business needs and emerging threats
Stay aware of the developing threat landscape in order to proactively adjust tools
Develop information security policies and procedures
Analyze and respond to information security incidents sourced from the user community, log
data, system data, host-based anti-malware systems, network-based antimalware systems,
packet analyzers, traffic analyzers, and vulnerability data
Proactively identify, assess, and design remediation plan for risks and vulnerabilities in the
Analyzing the current security architecture to identify weaknesses and develop opportunities for
Communicate, implement, and maintain security policies and controls
Ensure security documentation is accurate and up to date

Provide expert level security support and counsel to other teams
- Manage several vendor relationships
Other duties as assigned