OPSWAT · 9 hours ago
Enterprise Security Engineer (remote)
Maximize your interview chances
Cyber SecurityDeveloper APIs
H1B Sponsor Likely
Insider Connection @OPSWAT
Get 3x more responses when you reach out via email instead of LinkedIn.
Responsibilities
Contribute to designing and implementing solutions that support enterprise-wide security initiatives.
Design, build, maintain, tune, and enhance the effectiveness of our Enterprise Security controls in a wide range of security domains, including: Endpoint Detection and Response (EDR), Network Detection and Response (NDR), Email Security, Ransomware Resilience, Security Information and Event Management (SIEM), Data Loss Prevention (DLP)/Insider Risk, Conditional Access, Vendor/Business Process Outsourcing (BPO) Security, Device Posture and Attestation, Shadow IT, Threat and Vulnerability Management (TVM), Identity and Access Management (IAM), Identity Protection, Public Key Infrastructure (PKI).
Perform risk assessments and security assurance (threat modeling, code review as necessary) on a range of systems that support OPSWAT’s business operations: Operating Systems and commercial/open-source desktop applications, Internally developed Enterprise Infrastructure Services, Third-Party Software as a Service (SaaS) solutions, Network Infrastructure (ZTNA, CASB, VPN), Cloud Infrastructure (AWS, Azure).
Collaborate with our Governance Risk and Compliance (GRC) team to help develop enterprise security standards, guidelines, and policies.
Drive the remediation of security vulnerabilities identified through assessments.
Build security automation to secure our corporate infrastructure.
Evaluate cutting-edge Enterprise Security technology designed to increase our security posture.
Partner with our product management teams to provide feedback on the products and roadmap.
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
Bachelor’s degree or college diploma in the field of Information Security, Computer Science, Information Systems, or equivalent experience.
Expert on Microsoft Product Stack.
Full-stack knowledge of IT infrastructure including securing: Applications, Databases, Operating systems (Windows, Unix/Linux and Mac), Hypervisors, IP networks (WAN and LAN), Storage networks, CI/CD pipelines, Backup networks and media, and Containers/Kubernetes.
Direct, hands-on experience knowledge of managing and operating security infrastructure - e.g., firewalls, IDS, IPS, web application firewalls (WAFs), endpoint protection, SIEM, and DLP technology as well as vulnerability and configuration management tools.
Has working experience in Security Assurance: Penetration Testing, Code Review, and Threat Modeling.
Direct experience or strong working knowledge of designing IAM technologies and services using: Active Directory, Azure Active Directory, Privileged Access Management, Multifactor Authentication, and Amazon Web Service (AWS) IAM.
Strong working knowledge of IT service management (e.g., ITIL-related disciplines): Asset management, Configuration management, Incident management, Problem management, Change management, and Vendor/Supplier Management.
Preferred
One or more of these preferred certifications: CEH, Security+, CISSP, SANS: GCIA, GCDA, GDSA, GSOC, GCED.
Company
OPSWAT
OPSWAT is a Critical Infrastructure Protection CIP Cybersecurity for ICS and OT environments
H1B Sponsorship
OPSWAT has a track record of offering H1B sponsorships. Please note that this does not
guarantee sponsorship for this specific role. Below presents additional info for your
reference. (Data Powered by US Department of Labor)
Distribution of Different Job Fields Receiving Sponsorship
Represents job field similar to this job
Trends of Total Sponsorships
2022 (3)
2021 (2)
2020 (2)
Funding
Current Stage
Late StageTotal Funding
$125MKey Investors
Brighton Park Capital
2021-03-31Private Equity· $125M
Recent News
2024-12-06
2024-11-28
Company data provided by crunchbase