Security Engineer III

Full Time
Honolulu, HI 96821
Posted
Job description
Aloha! Welcome to Hawaiian Telcom's listing of current job openings. Hawaiian Telcom, the premier telecommunications company headquartered in Honolulu, offers Hawaii's consumers and businesses a spectrum of telecommunication solutions, taking full advantage of proven and emerging technologies. We are focused on building and maintaining a diverse team of employees who are committed to delivering an outstanding customer experience.
We call the communities we serve home and giving back to these communities is an important part of our culture.
Hawaiian Telcom offers an amazing Mālama Hours Program, Employee Resource Groups, and organized corporate community service events that further strengthen our community relationships.

We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, national origin, ancestry, age, disability, religion, sex, sexual orientation, gender identity, gender expression, protected veteran, military status or any other characteristic protected by law.

Due to U.S. Government requirements applicable to foreign-owned telecommunications providers, non-US citizens will be required to submit to an extensive government agency background check which will necessitate disclosure of sensitive Personally Identifiable Information.


Job Purpose

100% customer-facing position with the mission of managing technical security controls and effectively managing and communicating vulnerabilities, exploits, and incidents to appropriate operations teams while tracking metrics in order to assist the customer in managing risk. The primary purpose is to provide day-to-day management of the client's security infrastructure or day-to-day monitoring, management, and response to security events.


Essential Functions


Perform security assessments or reviews for Hawaiian Telcom customer's enterprise environment. While working with customer technical and executive staff, review the state of various technical and organizational controls processes, and policies. Perform gap analysis, comparing state to widely accepted best practices from vendors, regulatory and compliance bodies, and the security community at large. Document these gaps, along with sensible and relevant recommendations, in findings reports that satisfy the needs of both a technical and non-technical audience.


Perform vulnerability scans and penetration tests of HT customer environments and controls. Using expertise in the operation of commercial and open-source assessment tools, identify configuration flaws, missing patches, and gaps in defenses that could be exploited by attackers. Assessment types will include social engineering and phishing, wireless, mobile device, and physical security, and web application penetration tests.


Assist HT customer staff with security needs. Provide recommendations for security architecture, processes, and technologies. Write technical policy, processes, procedures, standards, and other documentation. Perform security research, furthering individual and team understanding of the threat landscape, as well as cutting-edge security technologies. Attend security conferences and participate in local security community events. Evaluate products and tools that can improve the security services team's offerings, and provide value to customers.


Leadership role in cultivating and maintaining the relationship with HT customers, vendors, and partners.


Act as technical SME and work all technical escalations from the security operations team including outages and incidents. Lead technical troubleshooting or incident handling events/calls on behalf of the client's security operations team and with the Network, Compute, and Client Operations Teams, internal and external information providers, and others as appropriate.


Lead all aspects of planning, documentation, and process development of HT client's global security operations; Drive development of technical procedures and guidelines for implementation and management of Security services as they relate to the global operations team.


Lead technical project efforts for the client's security operations team.


Leadership role in cultivating and maintaining relationships with customers.


Participate in expansion of new opportunities with existing customers as they expand their global security operations requirements.


Experience

  • 6 to 7 years of experience
  • Senior level roles as IT Security Architect
  • IT Security Engineer
  • IT Security Auditor
  • Cyber-Security Analyst
  • Cyber-Intelligence Analyst

Education

  • Four years of College resulting in a Bachelor's Degree or equivalent
Certifications, Accreditations, Licenses

One or more of the following certifications dependent on the actual role:

  • Advanced GIAC/SANS certifications - GCIH, GCIA, GCFE, GCFA, GREM, GIAC, GSEC, GWAPT
  • ISC-squared CISSP
  • CompTIA Security+
  • Must be able to obtain additional security clearances

Special Knowledge, Skills, and Abilities

  • Ability to work independently for extended periods of time with a consultative approach, able to make "command decisions", and exhibit leadership skills to be the "go-to" person. Must be a team player, and possess the ability to lead technical, troubleshooting, and design scenarios.
  • Strong auditing, assessment, and enterprise security architecture development skills should be a key focus in career history.
  • Experience with technical training and instruction
  • Experience with public speaking and presentation on technical topics
  • Enterprise IT security architecture experience in a broad range of disciplines including networking, systems, applications, and cloud computing environments.
  • Experience with enterprise host protection systems, enterprise vulnerability management, network security tools such IPS/IDS, and/or experience with attack tactics, techniques, and procedures used by the APT, Cyber Crime, and other associated threat groups.
  • Dependent on position, strong demonstrated skills in multiple enterprise-level OS environments including Microsoft Windows, Linux, and Unix.
  • Strong understanding of network communications (TCP/IP, Ethernet, WAN/LAN technologies)
  • Exceptional research and analysis experience
  • Risk assessment experience
  • Auditing experience
  • CIRT experience.
  • Knowledge of information security threat types, their composition, and IOCs
  • Dynamic Malware Analysis Experience
  • Knowledge of attacker tactics, techniques, and procedures (TTPs) used by the APT, Cyber Crime and other associated threat groups
  • Knowledge of computer security incident investigation and response
  • Experience analyzing common types of attacks, cybercrime, APT, etc...
  • Experience with Splunk or similar Log analysis tools and experience reviewing security events
  • Experience reviewing, analyzing, and providing reporting on ongoing Intel gathering from various classified, sensitive, as well as open-source intelligence sources
  • Deep internal knowledge of the MS Windows operating system, file system, registry, processes, and communications as well as collection and analysis techniques.
  • Knowledge of intrusion analysis, network, and host forensics
  • Scripting experience is a plus (Python, Perl, Ruby, etc.)
  • Working knowledge and experience with standard security solutions and architectures
  • Working knowledge of application architectures, web architectures, databases, and network architectures
  • Experience in Securing Windows NT, Windows 2000, Windows XP Environments, Unix, and Linux environments
  • Experience in securing J2EE Application (Weblogic, JBOSS) and Web Server (SunOne, Apache) platforms
  • Familiarity with accepted security standards - ISO27K, NIST 800-53, SANS Consensus Audit Guidelines - as well as regulatory compliance regulations - PCI-DSS, Sarbanes-Oxley, HIPAA/HITECH, FFIEC, FISMA, FERC/NERC and trade control regulations (aka export controls) for DoS (State Department), DoC (Commerce Department) and DoE/NRC (Energy Department, Nuclear Regulatory Commission)
  • Experience in securing distributed applications
  • Experience with encryption technologies
  • Experience in secure network configurations
  • Solid communication skills (leading, influencing experience), verbal and written, including documentation (design and training), and the coaching of other developers as they migrate to portal frameworks.
  • Experience securing Relational Databases (e.g. Oracle)
  • Experience with security testing and auditing tools such as WebInspect, Qualys/ISS Scanners, and nmap.

Supervisory Responsibilities

No Supervisory Responsibility

caravetterealestate.com is the go-to platform for job seekers looking for the best job postings from around the web. With a focus on quality, the platform guarantees that all job postings are from reliable sources and are up-to-date. It also offers a variety of tools to help users find the perfect job for them, such as searching by location and filtering by industry. Furthermore, caravetterealestate.com provides helpful resources like resume tips and career advice to give job seekers an edge in their search. With its commitment to quality and user-friendliness, caravetterealestate.com is the ideal place to find your next job.

Intrested in this job?

Related Jobs

All Related Listed jobs