Security Operations Engineer

Posted 29 January 2025
Salary 150000
LocationDallas
Job type Permanent
Discipline Cyber Security
Reference72429
Contact NameGreg Anderson
Remote working Remote

Job description

Security Operations Engineer
Remote in the US: Preference for candidate to be location in PT or CT time zones
$150,000

Currently working with a growing security team to hire a Security Operations Engineer to help build and enhance a new security program and tool stack from the ground up. This role is ideal for professionals with broad security expertise who have successfully implemented security technologies and processes from scratch. The primary focus will be securing cloud and internal infrastructure, monitoring for threats, and leading incident response efforts. The engineer will collaborate across teams to establish security controls, optimize processes, and manage security tools in areas such as threat intelligence, vulnerability management, and SIEM.

 
  • Security Controls Implementation: Design and deploy security measures to protect cloud and internal infrastructure.
  • Tool Deployment & Management: Oversee the configuration and maintenance of security solutions, including vulnerability management, SIEM, EDR, firewalls, threat intelligence, and cloud security tools.
  • Incident Response & Threat Monitoring: Continuously monitor systems for threats, respond to security incidents, and refine incident response (IR) playbooks.
  • Vulnerability Management: Conduct security assessments, analyze vulnerability scan results, and coordinate remediation efforts.
  • Threat Intelligence & SIEM Management: Leverage threat intelligence to enhance detection and prevention capabilities, while managing and tuning the organization’s SIEM platform.
  • Automation & Efficiency: Identify opportunities to automate security processes to improve response times and operational effectiveness.
  • Security Best Practices & Compliance: Support system hardening efforts, ensure adherence to security frameworks, and contribute to internal policy development.
  • Cross-Team Collaboration: Partner with IT, DevOps, and compliance teams to integrate security best practices into business operations and projects.