Join to apply for the Information Security Engineer I role at Lensa 9 hours ago Be among the first 25 applicants Join to apply for the Information Security Engineer I role at Lensa Get AI-powered advice on this job and more exclusive features. Lensa is a career site that helps job seekers find great jobs in the US. We are not a staffing firm or agency. Lensa does not hire directly for these jobs, but promotes jobs on LinkedIn on behalf of its direct clients, recruitment ad agencies, and marketing partners. Lensa partners with DirectEmployers to promote this job for Lumen Inc. Clicking "Apply Now" or "Read more" on Lensa redirects you to the job board/employer site. Any information collected there is subject to their terms and privacy notice. About Lumen Lumen connects the world. We are igniting business growth by connecting people, data and applications – quickly, securely, and effortlessly. Together, we are building a culture and company from the people up – committed to teamwork, trust and transparency. People power progress. We’re looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future. The Role Federal SOC Information Security Engineers will provide monitoring, triage, and escalation support for internal Federal SOC and External Customer operations. The SOC Information Security Engineers will work shifts to provide 24x7x365 coverage. SOC Information Security Engineers will work in tandem with other Information Security Engineers in the Global SOC and Federal NOC Organizations. The Main Responsibilities Review SOC Shift end Summary and SOC activity logs, emails, tickets, cases and other monitoring tools for complete understanding of previous shift activities and incidents with the goal of maintaining the highest level of customer service by keeping track of the critical customer impacting issue. Provide monitoring and responding to alerts and events within SLAs. Services and systems include but not limited to Splunk (internal/external SIEM), Firewalls alerts (MTIPS and MSS), TrendMicro Anti Virus, Tripwire File Integrity Checks, IDS/IPS for customers. Monitor multiple ticketing systems and queues. Ensure tickets are created and notated within SLAs Login to phone call queues to answer both internal and external calls Work closely with FedNOC, the Federal SOC Tier II and Ops Eng teams Escalate issues to Vendors, SOC Tier II and Ops Engineers as soon as there is a need Adhere to all defined processes and procedures. Provide process and operational improvement suggestions. Performs a long-term project leadership role working towards the development of new solutions, processes, tools, systems that have company-wide and possibly industry-wide impacts. Frequent contact with senior leadership of customers and contractors for the purpose of creating and presenting innovative long-term solutions and managing key relationships. Acts as a resource within the engineering and scientific communities to develop solutions or handle the most complex tasks for which existing methods and procedures may not apply. Provides consultation and advice to Federal customers, engineers and management regarding work functions, processes, methods, procedures, and tools. Develops and delivers technical and process training, including, documentation in areas of expertise and innovative areas of technology. What We Look For In a Candidate (education / experience / skills / competencies). Tripwire, TrendMicro, Web Inspect, Tennable Nessus and Qualys vulnerability scanners, Splunk, Secure Log Management, Firewalls, Intrusion Detection. Ability to diagnose Trip Wire Events, Trend Micro Events, System Events, Network Events from 4 Supported Environments with dissimilar architecture. MFA provisioning, repair, revocation, re-provisioning, reporting, and troubleshooting experience. Diagnose and identify reports and alerts within Splunk. Isolate BGP alerts and notify customer and other operational teams of an event. Perform Analytics on events from customer networks per CDM Framework. Experience working out of a ticket queue and receiving inbound customer calls. Experience managing Fortigates and Palo Alto Firewalls. Equivalent educational experience. Above all, a motivated and trainable individual. Clearance: Government Suitability Clearance required. Certifications (preferred but not required): CEH, GIAC Certified Incident Handler (GCIH), CCNA, NSE4. Education: BS Computer Science or related areas with experience. Compensation This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors. Location Based Pay Ranges:
...CompensationFlexible ScheduleJob Summary We are seeking a professional Security Agent to join our team. In this role, your primary... ...Agent or in a similar position is preferredValid PERC cardHigh school diploma/GEDStrong understanding of public safety and security...
...players to deliver those quality products. Position summary: The driver position is responsible for delivering petroleum products (fuel,... ...other accessories Qualifications: Class A or B License with Hazmat and Tanker Endorsement Training: ~ Safety Training...
...supplies and equipment, trash compactor (must be 18 year of age for trash compactor use). Repetitive Action: Continuous movement of entire body. Working Conditions: Working environment is inside and may have exposure to cold temperatures. Roche Bros. Supermarkets
...Job Description Job Description Description: The Conditioning Tower Operator will work closely with the Plant Operations Manager to ensure all conditioning requests meet our customers needs. The role may consist of seed conditioning, grading, treating, packaging...
International Masters student at Elliott Scholl studying Security Policy Studies need tutorials to help him getting familiar with the USA studies.Fees to be discussed and subject to experience and open to discussion.