Security Engineer II in Hoffman Estates, IL at Sears Holdings Corporation

Date Posted: 7/9/2018

Job Snapshot

  • Employee Type:
  • Location:
    3333 Beverly Road
    Hoffman Estates, IL
  • Date Posted:
  • Job ID:

Job Description

Req/Job ID: 930414BR
Employing Entity: Sears Holdings Management Corporation
Employment Category: Regular, Full-time
Job Function: Information Technology
Store ID: 58491: Sears Holdings Management Corp

The Security Engineer II is a highly specialized technical position with hands-on support of the security operations function. Will be responsible for performing operational processes for antivirus, event monitoring/correlation (SEIM), intrusion prevention, investigations, security awareness, incident response, and compliance. Must be a Subject Matter Expert with McAfee ePO and/or Carbon Black.

Job Requirements

Required Skills/ Experience:
  • 2-5 years' experience in information security.
  • Bachelor's degree in computer science, specialized systems training, or equivalent work experience.
  • SME with McAfee ePO and/or Carbon Black
  • Experience in an operational and/or user support organization for a minimum of 2-5 years.
  • Experience/working knowledge of industry-recognized security tools including antivirus solutions, FIM, whitelisting, SIEM, IDS/IPS, enterprise encryption solutions, and endpoint security.
  • Experience in malware analysis (debuggers, disassemblers, and hex editors) and remediation and mitigation strategies.
  • Experience in scripting and programming languages such as ruby, perl, python, javascript, powershell, shell, etc.
  • Experience analyzing events utilizing commercial SIEM technology and correlating events to identify malicious behavior and activity.
  • Experience responding to and resolving security based incidents
  • Strong, organizational, analytical, and interpersonal skills
  • Ability to communicate complex technical concepts effectively both orally and in writing
  • Ability to execute with a sense of urgency
Desired, but not required Skills/ Experience:
  • Security or network certifications including the CISSP (Certified Information Systems Security Professional), GIAC, CEH (Certified Ethical Hacker), GREM, and CCSP (Cisco Certified Security Professional)
  • Experience in a 24x7 SOC (Security Operations Center)
  • Experience in using memory analysis tools to investigate and analyze malware infections.

Job Duties/Responsibilities:
  • Conduct analysis of malicious events and known exploits/vulnerabilities for the creation of custom signature rule sets for the accompanying modules, as necessary.
  • Be able to analyze malicious files through use of static and dynamic analysis and provide expertise in cyber forensics for identifying malicious viruses, worms, Trojans, and backdoors.
  • Identify security exposures; recommend corrective action by conducting gap analyses.
  • Provides timely and adequate response to threats/alerts, including off-hour support.
  • Executes established processes to correlate and assess security events.
  • Works on investigations and forensic analysis activity in support of Legal Compliance/Corporate Investigations.
  • Serves as the primary liaison between Information Security, Security and Legal ensuring efficient, secure data collection and evidence from various sources required for litigation or investigation; defines and maintains data collection processes and procedures, including comprehensive documentation; ensures data retention practices are intact to support litigation e-discovery demands.
  • Participates in research and evaluation of security solutions.
  • Develops security solutions using structured development methodology in accordance with corporate standards and industry standards.
  • Provides timely and sufficient response to security incidents and assessment services and documents findings.
  • Conducts technical or business analysis and resolves system/user problems in order to maintain efficient operations.
  • Promotes security awareness.
  • Works towards exceeding service levels and customer expectations.
  • Assists in defining processes to carry out all security operations and incident response functions.
  • Helps improves data for operational metrics and progress reports from a quantitative and qualitative standpoint.
  • Responds to security audits and assessments.
  • Identifies areas of existing policies and procedures that require change or require new processes; ensures enhancements are made to documentation in a timely manner.
  • Provides on-call support 24x7x365, as required/scheduled.
  • Interfaces with other areas to support existing production systems and implement new and enhanced systems in accordance with company strategic architecture.
  • Provides specialized expertise to support other information technology projects/activities.
  • Identifies and resolves operational problems through final resolution.

#Corporate, #Technology