Security Engineer Engineering - Milwaukee, WI at Geebo

Security Engineer

Overview:
Foley & Lardner LLP is currently seeking a Security Engineer to join our Information Security team.
The right candidate will be responsible for the advanced development, monitoring, implementation, maintenance, and support of the firms information technology security infrastructure.
Responsibilities:
Manages distributed network of firewalls and their configurations according to vendor and industry best practice.
Proactively monitors network security systems and services; actively pursues prompt resolution to system alerts and incidents.
Provides troubleshooting for network security systems and service issues as needed or directed.
Escalates issues for further analysis as needed.
Makes recommendations to prevent future occurrences.
Works with DUO Multi Factor Authentication platform to ensure system is operating as intended.
Familiarity with managing anti-phishing technologies and the basic principles of email security.
Proactively monitors and manages Endpoint Detection and Response (EDR) solution and responds to relevant alerts.
Performs forensic capture and preserve chain of custody during events and incidents using various tools and technologies.
Works within SOAR platform to ensure the ingestion / population of OSINT feeds are occurring properly and develop playbooks to increase automation in response activity.
Drives identification and remediation of vulnerabilities across a diverse array of systems and applications.
Works to identify and escalate Data Loss Prevention incidents and tune DLP rule set for greater fidelity.
Assists and supports the Technology Assistance Center in resolving advanced level customer support issues.
Participates in on-call rotations and provides after-hours support when needed.
Works in concert with management to recommend, evaluate and implement new technology solutions as warranted.
Acts as the Information Security representative on various projects and research tasks.
Manages multiple projects and competing priorities in a fast-paced environment.
Acts in accordance with department and firm policy and procedures.
Approaches tasks with a strong ethical and moral compass.
Willingness to learn and passion for continued growth within the Information Security field.
Light travel expected.
Qualifications:
High School Diploma or GED required; Associate's or Bachelor's Degree in Engineering, IT, Computer Science, or Information Security desired Minimum of three (3) years experience in a network security support role required Security Industry certification(s) (e.
g.
, CISA, CISSP, Security+, OSCP, CEH, AZ-500, AZ-900) preferred Experience or familiarity with four or more of the following technologies:
Palo Alto Firewalls, network security principles / VPN connectivity, vulnerability management, DUO multi-factor authentication, Next-Gen Antivirus/EDR/XDR, email security, DLP, SOAR, NAC, SIEM, CASB, public cloud Security, Active Directory security principles, configuration hardening.
Experience with firewall functionality, best practice configurations, and maintenance (e.
g.
, policy management, URL filtering, threat management, external dynamic lists EDL , decryption, etc.
) Experience in basic scripting (e.
g.
, Python, Powershell) Excellent written and verbal communication skills Strong interpersonal skills with a customer focus Recommended Skills Active Directory Group Automation Certified Information Security Manager Certified Information Systems Security Professional Communication Curiosity Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.