Kodiak Security Operations Engineer
Chicago
Your Journey at Crowe Starts Here:
At Crowe, you have the opportunity to deliver innovative solutions to today’s complex business issues. Crowe’s accounting, consulting, and technology personnel are widely recognized for their in-depth expertise and understanding of sophisticated process frameworks and enabling technologies, along with their commitment to delivering measurable results that help clients build business value. Our focus on emerging technology solutions along with our commitment to internal career growth and exceptional client value has resulted in a firm that is routinely recognized as a “Best Place to Work.” We are 75 years strong and still growing. Come grow with us!
Job Description:
Kodiak Security Operations Engineer
Overview:
The Information Security Engineer is responsible for designing, implementing, and maintaining security measures within an organization. They work with the MSSP to monitor networks, investigate incidents, and collaborate with IT teams to ensure robust security practices. The Information Security Engineer contributes to technology projects, creates and updates security standards and policies. The Information Security Engineer assesses the information security program in relation to applications and systems, identifying strengths and weaknesses and providing feedback to technology teams to enhance the firm’s overall security posture.
Responsibilities:
- Works with the MSSPs, Security, IT and other business units to manage day-to-day security activities, monitor alerts, and respond to incidents.
- Works with the MSSP’s in identifying, assessing, and remediating security vulnerabilities across the organization’s systems.
- Collaborates on protecting and managing endpoints (e.g., computers, servers) by implementing security controls and monitoring solutions.
- Configures and maintains network firewalls to control traffic and enforce security policies.
- Ensures secure cloud environments by implementing best practices, managing access controls, and monitoring cloud services.
- Leads in incident handling, investigates security breaches, and coordinates response efforts.
- Meet regularly with security team leaders and MSSP vendor to assess and collaborate on changes that would be built into security operations and controls.
- Facilitate and drive updates to security processes and tools to meet industry and technology evolution.
- Research relevant security technologies for potential improvements / best practice application.
- Research relevant security news topics to maintain understanding of current security threats, methodologies and potential risks to the firm
Qualifications:
In-depth knowledge and practical experience with industry security standards and frameworks,
- In-depth knowledge and practical experience with industry standard security tools, including deployment, administration and usage, is needed maintain firm security programs owned by Information Security.
- Advanced understanding of IT and Security and Architecture fundamentals is required (Infrastructure, Azure, AWS, Operating Systems, Virtualization, Networking Concepts, Commands and Scripting, Network Security, Operational Security, Threats, Host Security, Access Control, Cryptography, etc.). This knowledge is necessary for designing effective event monitoring, security testing, and remediation plans for business applications and systems in the environment.
- Technical knowledge of vulnerability assessment and exploitation, and practical experience with risk analysis and mitigation strategies are necessary to perform security testing, and to work with other stakeholders to design effective remediation plans.
- Technical knowledge of security monitoring tools and practical experience with threat detection, threat hunting and incident response are necessary to perform event monitoring in this role.
- Maintain awareness of threat actors and attack trends, as well as those specific to the firm, to identify risks and provide recommendations to management in response to changing threat landscape.
- The ability to manage a number of projects, and be able to adjust quickly to changing priorities in a dynamic environment.
- Flexible, agile and able to manage work within ambiguity as necessary.
- Excellent organizational/project management and analytical skills.
Requirements:
Bachelor's degree in Computer Science, MIS, Information Systems, or equivalent experience
- Graduate degree and /or relevant certification(s) desired
- 5 years in Information Security role
- Travel maybe required to perform job/project duties
- As required, work after-hours
We expect the candidate to uphold Crowe’s values of Care, Trust, Courage, and Stewardship. These values define who we are. We expect all of our people to act ethically and with integrity at all times.
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Crowe, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $82,385.00 to $179,521.00 per year.
Our Benefits:
At Crowe, we know that great people are what makes a great firm. We value our people and offer employees a comprehensive benefits package. Learn more about what working at Crowe can mean for you!
How You Can Grow:
We will nurture your talent in an inclusive culture that values diversity. You will have the chance to meet on a consistent basis with your Career Coach that will guide you in your career goals and aspirations. Learn more about where talent can prosper!
More about Crowe:
Crowe (www.crowe.com) is one of the largest public accounting, consulting and technology firms in the United States. Crowe uses its deep industry expertise to provide audit services to public and private entities while also helping clients reach their goals with tax, advisory, risk and performance services. Crowe is recognized by many organizations as one of the country's best places to work. Crowe serves clients worldwide as an independent member of Crowe Global, one of the largest global accounting networks in the world. The network consists of more than 200 independent accounting and advisory services firms in more than 130 countries around the world.
Crowe LLP provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
Crowe LLP does not accept unsolicited candidates, referrals or resumes from any staffing agency, recruiting service, sourcing entity or any other third-party paid service at any time. Any referrals, resumes or candidates submitted to Crowe, or any employee or owner of Crowe without a pre-existing agreement signed by both parties covering the submission will be considered the property of Crowe, and free of charge.
Tags: Agile AWS Azure Cloud Computer Science Cryptography Firewalls Incident response Monitoring Network security Risk analysis Scripting Threat detection Vulnerabilities
Perks/benefits: Career development Flex hours
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Penetration Tester jobs
- Open Cloud Security Architect jobs
- Open Security Operations Engineer jobs
- Open Principal Security Engineer jobs
- Open Information Security Officer jobs
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Senior Product Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open Cyber Security Architect jobs
- Open IT Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Network Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open Security Consultant jobs
- Open IT Security Analyst jobs
- Open Senior Information Security Analyst jobs
- Open Security Operations Analyst jobs
- Open Manager Pentest H/F jobs
- Open Information Security Architect jobs
- Open Information System Security Officer jobs
- Open Agile-related jobs
- Open Risk assessment-related jobs
- Open SOC-related jobs
- Open Analytics-related jobs
- Open Network security-related jobs
- Open CISA-related jobs
- Open ISO 27001-related jobs
- Open GCP-related jobs
- Open IAM-related jobs
- Open Application security-related jobs
- Open Pentesting-related jobs
- Open Threat intelligence-related jobs
- Open Vulnerability management-related jobs
- Open DevOps-related jobs
- Open DoD-related jobs
- Open Security Clearance-related jobs
- Open APIs-related jobs
- Open CEH-related jobs
- Open Security assessment-related jobs
- Open SaaS-related jobs
- Open Malware-related jobs
- Open Kubernetes-related jobs
- Open Java-related jobs
- Open EDR-related jobs
- Open TS/SCI-related jobs