Kodiak Security Operations Engineer

Chicago

Your Journey at Crowe Starts Here:

At Crowe, you have the opportunity to deliver innovative solutions to today’s complex business issues. Crowe’s accounting, consulting, and technology personnel are widely recognized for their in-depth expertise and understanding of sophisticated process frameworks and enabling technologies, along with their commitment to delivering measurable results that help clients build business value. Our focus on emerging technology solutions along with our commitment to internal career growth and exceptional client value has resulted in a firm that is routinely recognized as a “Best Place to Work.” We are 75 years strong and still growing. Come grow with us! 

Job Description:

Kodiak Security Operations Engineer


Overview:
The Information Security Engineer is responsible for designing, implementing, and maintaining security measures within an organization. They work with the MSSP to monitor networks, investigate incidents, and collaborate with IT teams to ensure robust security practices. The Information Security Engineer contributes to technology projects, creates and updates security standards and policies. The Information Security Engineer assesses the information security program in relation to applications and systems, identifying strengths and weaknesses and providing feedback to technology teams to enhance the firm’s overall security posture.

Responsibilities:

  • Works with the MSSPs, Security, IT and other business units to manage day-to-day security activities, monitor alerts, and respond to incidents.
  • Works with the MSSP’s in identifying, assessing, and remediating security vulnerabilities across the organization’s systems.
  • Collaborates on protecting and managing endpoints (e.g., computers, servers) by implementing security controls and monitoring solutions.
  • Configures and maintains network firewalls to control traffic and enforce security policies.
  • Ensures secure cloud environments by implementing best practices, managing access controls, and monitoring cloud services.
  • Leads in incident handling, investigates security breaches, and coordinates response efforts.
  • Meet regularly with security team leaders and MSSP vendor to assess and collaborate on changes that would be built into security operations and controls.
  • Facilitate and drive updates to security processes and tools to meet industry and technology evolution.
  • Research relevant security technologies for potential improvements / best practice application.
  • Research relevant security news topics to maintain understanding of current security threats, methodologies and potential risks to the firm

Qualifications:

  • In-depth knowledge and practical experience with industry security standards and frameworks,

  • In-depth knowledge and practical experience with industry standard security tools, including deployment, administration and usage, is needed maintain firm security programs owned by Information Security.
  • Advanced understanding of IT and Security and Architecture fundamentals is required (Infrastructure, Azure, AWS, Operating Systems, Virtualization, Networking Concepts, Commands and Scripting, Network Security, Operational Security, Threats, Host Security, Access Control, Cryptography, etc.).  This knowledge is necessary for designing effective event monitoring, security testing, and remediation plans for business applications and systems in the environment.
  • Technical knowledge of vulnerability assessment and exploitation, and practical experience with risk analysis and mitigation strategies are necessary to perform security testing, and to work with other stakeholders to design effective remediation plans.
  • Technical knowledge of security monitoring tools and practical experience with threat detection, threat hunting and incident response are necessary to perform event monitoring in this role.
  • Maintain awareness of threat actors and attack trends, as well as those specific to the firm, to identify risks and provide recommendations to management in response to changing threat landscape.
  • The ability to manage a number of projects, and be able to adjust quickly to changing priorities in a dynamic environment. 
  • Flexible, agile and able to manage work within ambiguity as necessary.
  • Excellent organizational/project management and analytical skills.

Requirements:

  • Bachelor's degree in Computer Science, MIS, Information Systems, or equivalent experience

  • Graduate degree and /or relevant certification(s) desired
  • 5 years in Information Security role
  • Travel maybe required to perform job/project duties
  • As required, work after-hours

We expect the candidate to uphold Crowe’s values of Care, Trust, Courage, and Stewardship. These values define who we are. We expect all of our people to act ethically and with integrity at all times.


The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Crowe, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $82,385.00 to $179,521.00 per year.


Our Benefits:

At Crowe, we know that great people are what makes a great firm. We value our people and offer employees a comprehensive benefits package. Learn more about what working at Crowe can mean for you!

How You Can Grow:

We will nurture your talent in an inclusive culture that values diversity. You will have the chance to meet on a consistent basis with your Career Coach that will guide you in your career goals and aspirations. Learn more about where talent can prosper!

More about Crowe:

Crowe (www.crowe.com) is one of the largest public accounting, consulting and technology firms in the United States. Crowe uses its deep industry expertise to provide audit services to public and private entities while also helping clients reach their goals with tax, advisory, risk and performance services. Crowe is recognized by many organizations as one of the country's best places to work. Crowe serves clients worldwide as an independent member of Crowe Global, one of the largest global accounting networks in the world. The network consists of more than 200 independent accounting and advisory services firms in more than 130 countries around the world.

Crowe LLP provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.

Crowe LLP does not accept unsolicited candidates, referrals or resumes from any staffing agency, recruiting service, sourcing entity or any other third-party paid service at any time. Any referrals, resumes or candidates submitted to Crowe, or any employee or owner of Crowe without a pre-existing agreement signed by both parties covering the submission will be considered the property of Crowe, and free of charge.

Apply now Apply later
  • Share this job via
  • or

Tags: Agile AWS Azure Cloud Computer Science Cryptography Firewalls Incident response Monitoring Network security Risk analysis Scripting Threat detection Vulnerabilities

Perks/benefits: Career development Flex hours

Region: North America
Country: United States
Job stats:  5  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.