Responsible for the planning, design and build of security architectures; oversees the implementation of network and computer security and ensures compliance with corporate cybersecurity policies and procedures. Monitors cybersecurity requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related network devices. Performs security assessments of applications and systems using penetration and vulnerability testing and risk analysis. Configures and installs firewalls and intrusion detection systems. Implements software fixes (patches) to remove system vulnerabilities. Responds immediately to cybersecurityrelated incidents and provides a thorough postevent analysis. Investigates intrusion incidents and conducts forensic investigations.
Qualifications
Qualifications:
You must possess the below minimum qualifications to be initially considered for this position. Preferred qualifications are in addition to the minimum requirements and are considered a plus factor in identifying top candidates.
Minimum Qualifications:
Bachelor's degree in Computer Science, Computer Engineering, Information Systems, Cyber/Information Security or any other related field
At least 5 years of experience in the following:
Practical security experience with an emphasis on engineering and application support/development.
Script writing for automation and integration (e.g. Python, PowerShell, Ansible).
Windows and/or Unix/Storage infrastructure experience.
Exceptional Project Management Skills including Stakeholder management, Communication, Presentations to senior management forums.
Preferred Qualifications:
Experience in the following:
Application/systems support.
Supporting web servers (e.g., Apache).
Secure software development principles.
Linux administration (i.e. installing, configuring and troubleshooting in Linux environment).
Working with APIs (including data integration (e.g. Kafka, Denodo).
Enterprise computing environments, including application architectures, network and application protocols and database reporting.
SQL databases (e.g., Postgres).
Monitoring tools (e.g., New Relic, Splunk ITSI).
Security Information Event Management (SIEM) tuning and reporting.
SSO, LDAP, PAM and other basic Linux authentication integrations, Django, Gitlab or other code management/version control platforms, Cloud Platforms (AWS, Azure, etc.), Docker and/or Kubernetes, Application.
Lifecycle Management tools, Application Security Testing tools.
Vulnerability Management, including an understanding of the process and activities required in vulnerability scanning, identification and reporting through to vulnerability remediation.
Frameworks, standards and best practices (i.e. NIST, OWASP, PCI, ISO, COBIT).
Security industry certifications such as GSEC or CISSP.
Experience in Agile.
Intel's Information Technology Group (IT) designs, deploys and supports the information technology architecture and hardware/software applications for Intel. This includes the LAN, WAN, telephony, data centers, client PCs, backup and restore, and enterprise applications. IT is also responsible for e-Commerce development, data hosting and delivery of Web content and services.
Work Model for this Role
This role will be eligible for our hybrid work model which allows employees to split their time between working on-site at their assigned Intel site and off-site.
Get email alerts for the latest"MIT Windows and Information Security Engineer jobs in Qiryat gat"
