Role Purpose:
The Senior Cyber Security Engineer will design and implement IT security systems to protect the organization's computer networks from cyber-attacks. This position will also help develop best practices for IT security. They will monitor systems, applications, and networks for security issues, install security software, and document all security issues or breaches they find.
This is an individual contributor role with accountability for regional IT security outcomes and work done by security contractors; this role does not include direct management of employees.
This position will work closely with members of the IT Operations team to coordinate efforts related to improving the security posture of the organization, as well as the coordination and execution of Security Incident Response efforts. This person will be viewed as a Subject Matter Expert in terms of security concepts and technologies, as well as related concepts such as AI and privacy.
Essential Duties and Responsibilities:
- Deploy, tune and monitor intrusion detection/prevention systems (IDS/IPS), Security Information and Event Management (SIEM) tools, endpoint security (MDR/XDR) tools, Cloud Security Posture Management (CSPM) tools, email gateways, firewalls, network infrastructure and other appliances for security issues.
- Work in a single global team across a multi-organization, multi-country enterprise to help define and maintain a global security program.
- Lead investigative processes towards identifying root cause of security events, evaluate incoming security alerts and anomalous activity, and recommend or adjust detection settings when necessary to reduce false positives.
- Collect and perform forensic analysis of network packet captures, live memory and drive acquisitions, malware samples, as well as logs from various types of security sensors, applications, and operating systems.
- Investigate security breaches and other cybersecurity incidents, followed up with all necessary documentation.
- Maintain industry awareness of threats and capabilities to provide guidance on security tooling selection and implementation - closing the gap in endpoint and network visibility across the enterprise.
- Participate in Security Architecture reviews for new projects to ensure proposed solutions align with risk requirements (revising or creating architectural-level documentation as needed)
- Participate in the design and execution of vulnerability assessments, penetration tests, and security audits.
- Work with IT Infrastructure, IT Operations, and IT Applications stakeholders to facilitate the remediation of detected vulnerabilities to maintain a high-security standard.
- Document best practices using available collaboration tools and workspaces.
- Collaborate to define IT Security standards and develop supporting organizational policies.
- Support vendor due-diligence process and help to lead and define overall third-party risk management efforts for IT vendors and contractors.
- Support internal and external audit process for relevant compliance concerns including SOX, CCPA, and GDPR requirements.
- Participate in disaster recovery and business continuity planning and test exercises.
Qualifications
Education and/or Experience:
Required:
Associate degree with 4 years of experience working in an Information Security role, OR bachelor's degree with 2 years of experience working in an Information Security role, OR 6+ years of relevant experience in a technical security role.
Preferred:
- GIAC: Certified Incident Handler
- GIAC: Certified Enterprise Defender
- GIAC: Security Essentials (GSEC)
- (ISC)2: CISSP, SSCP, CCSP, CGRC, ISSAP, ISSEP, ISSMP
- EC-Council: CEH, CPENT, CHFI, CND, CCSE, ECDE, ECIH, CTIA
- CompTIA: Security+, CASP+
Competencies and Proficiency Requirements:
- Overseeing Security Information and Event Management (SIEM) technologies and effectively managing alerts. Tuning, as necessary to avoid false negatives and false positives.
- Experience running and leading incident response, including playbooks, tabletops, IR vendors and responding to security events.
- Experience analyzing log sources originating from security and networking devices such as firewalls, routers, proxy, anti-virus products, and operating systems.
- Experience in vulnerability management/remediation, incident management, network monitoring, and information security policies/procedures.
- Experience with a variety of Vulnerability Reporting tools (Nessus, Qualys, Rapid7), and related processes for patch deployment and vulnerability management.
- Experience with IT Security Frameworks (ex: NIST Cyber Security Framework, ISO 27001, COBIT)
- Experience with breach response activities including discovery, containment, evidence preservation, recovery, root cause analysis, and communications to multiple stakeholders.
- Experience in using training/LMS tools to provide regular awareness training and phishing simulations to all staff.
- Experience with Data-Management and Data Loss Prevention (DLP) tools.
- Experience with Data Privacy Regulations such as GDPR, CCPA, HIPAA, or similar.
- Strong experience with directly engaging with internal customers and wider stakeholders, including representing cyber security to both technical and non-technical personnel.
- Familiarity with multi-tenant M365 architecture and associated SSO/MFA capabilities.
- Understanding of basic principles, theories, standards, practices, protocols, references, and procedures used in cybersecurity.
- Knowledge of network-based services and client/server applications
- Knowledgeable of computer forensic analysis, data recovery, evidence handling, and eDiscovery tools and procedures in a predominately Windows and Linux environment.
- Knowledgeable of security frameworks and standards like NIST CFS, ISO 27001, CIS & PCI.
- Familiarity with intrusion detection and prevention systems, familiarity with network architecture and security infrastructure placement.
- Computer networking fundamentals, with understanding of TCP/IP and network protocols.
- Windows and Linux operating system fundamentals, OS command line tools.
- Familiarity with using, securing, and educating others about AI systems, tools, and best practices
- Strong analytical, observation, and problem-solving skills to enable effective security incident and problem resolution, both individually and in a collaborative team setting.
- Solid organization and planning skills, self-motivated, capable of working with limited supervision for long periods of time, able to manage/prioritize multiple longer-term projects.
- Strong verbal and written communication skills, with an ability to tailor messages to the intended audience (including end-users, auditors, IT personnel, and senior management)
- Excellent interpersonal skills, positive attitude, builds and maintains trusted relationships, able to influence, educate and inspire others.
- Proven ability to work in high-pressure/rapid response situations when necessary.
- Ability to drive security projects to completion, collaborating with other IT teams.
- Passion for keeping up with current cybersecurity issues and trends.
- Self-learner, continually exploring for new tools, techniques and tactics
Scope:
Team Size: 5
Conditions of Role:
- Some overtime or adjusted hours required
- Occasional travel required
- On-call hours required, including nights, weekends, and holidays
Allocation of Time:
- Plan β 10% - Research, analysis, update technical documentation, report metrics
- Do β 70% - Technical projects, technical assessments, security incident response, day to day security operations and alert management
- People β 20% - Coordinating with IT Operations and other IT Security team members
Compensation and Benefits:
- $110,000 -$140,000 / year USD (commensurate with experience and location)
- Medical, Prescription, Dental, Vision Coverage
- Flexible spending accounts
- Disability coverage
- Life insurance
- Critical illness and accident insurance
- Legal and identity protection insurance
- Pet insurance
- Employee assistance program
- Commuter benefits
- Tuition assistance
- Adoption assistance
- 401(k)
- PTO
- Parental Leave
Hain Celestial is an equal employment opportunity/affirmative action employer. The Company does not discriminate based on race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, expression, genetic information, protected veteran status or any other characteristics protected by applicable federal, state, or local law.
If you need accommodations for any part of the employment process because of a disability, please send an e-mail to talent@hain.com or call 516-587-5000 to let us know the nature of your request. EEO/AA/M/F/Veteran/Disabled.,Β #LI-MC1