What are the responsibilities and job description for the Sr. Information Security Engineer position at White Cap?
A position at White Cap isn’t your ordinary job. You’ll work in an exciting and diverse environment, meet interesting people, and have a variety of career opportunities.
The White Cap family is committed to Building Trust on Every Job. We do this by being deeply knowledgeable, fully capable, and always dependable, and our associates are the driving force behind this commitment.
Job Summary
Responsible for day-to-day efforts on Information security risk management for the organization, focusing on detailed technology issues.
Major Tasks, Responsibilities, And Key Accountabilities
If you’re looking to play a role in building America, consider one of our open opportunities. We can’t wait to meet you.
Functional Area Information Technology
Recruiter Haynes, Steven
Req ID WCJR-023752
White Cap is an Equal Opportunity Minority/Female/Individuals with Disabilities/Protected Veteran and Affirmative Action Employer. White Cap considers for employment and hires qualified candidates without regard to age, race, religion, color, sex, sexual orientation, gender, gender identity, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law.
The White Cap family is committed to Building Trust on Every Job. We do this by being deeply knowledgeable, fully capable, and always dependable, and our associates are the driving force behind this commitment.
Job Summary
Responsible for day-to-day efforts on Information security risk management for the organization, focusing on detailed technology issues.
Major Tasks, Responsibilities, And Key Accountabilities
- Conducts independent test and evaluation of new and existing systems. Performs testing to include system security testing, vulnerability scanning, security configuration reviews of desktop/laptop images, writing test plans, test cases/scripts, status reports and test summary reports.
- Identifies security vulnerabilities and develops algorithms and methods for detecting and preventing host and network based attacks.
- Performs advanced analysis and/or reverse engineering of suspect source code and makes the appropriate changes to security event detection systems.
- Implements the appropriate processes and tools to deliver sound investigations as well as analyze log files for activities surrounding security events.
- Initiates security response procedures when a problem is detected and methodically creates and updates security standard documentation. Develops attack and defense methodologies for high risk computer networks. Writes scripts and develop software utilities to automate security analysis efforts.
- Performs a wide range of technical operations related to the location, retrieval, processing, review, analysis, and production of electronic data for discovery, audit, or investigation.
- Performs quality checks on all data collected, copies final data deliverables to various media, and documents the procedures used in the collection process.
- Maintains procedures and devices in compliance with SOX compliance, PCI regulations and other regulatory authorities as required. Provides data to internal or external auditors for security and compliance audits. Serves as a liaison between the legal team, outside counsel, IT personnel, and internal organization.
- Identifies key barriers/core problems and applies problem solving skills in order to deal creatively with complex situations. Troubleshoots and resolves complex problems. Makes decisions under conditions of uncertainty, sometimes with incomplete information, that produce effective end results.
- Independently performs assignments with instruction limited to the expected results. Determines and develops an approach to solutions. Receives technical guidance only on unusual or complex problems or issues.
- May oversee the completion of projects and assignments, including planning, assigning, monitoring and reviewing progress and accuracy of work, evaluating results, etc. Contributes to employees' professional development but does not have hiring or firing authority.
- Located in a comfortable indoor area. Any unpleasant conditions would be infrequent and not objectionable.
- Most of the time is spent sitting in a comfortable position and there is frequent opportunity to move about. On rare occasions there may be a need to move or lift light articles.
- Typically requires overnight travel 5% to 20% of the time.
- Typically requires BS/BA in a related discipline. Generally 5-8 years of experience in a related field OR MS/MA and generally 3-5 years of experience in a related field. Certification is required in some areas.
- Layer 7 Firewall Management - REQUIRED.
- CSPM and Cloud security experience (Azure, AWS, OCI) - PREFERRED.
- Prisma Cloud - PREFERRED.
- Palo Alto is a plus.
If you’re looking to play a role in building America, consider one of our open opportunities. We can’t wait to meet you.
Functional Area Information Technology
Recruiter Haynes, Steven
Req ID WCJR-023752
White Cap is an Equal Opportunity Minority/Female/Individuals with Disabilities/Protected Veteran and Affirmative Action Employer. White Cap considers for employment and hires qualified candidates without regard to age, race, religion, color, sex, sexual orientation, gender, gender identity, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law.