Information Security Engineer
Let me tell you about an artificial intelligence (AI) company that you probably have never heard of, but you will. As a matter of fact, this company is the world’s largest independent AI company and it’s headquartered in the Boston area. We operate at the intersection of customer experience and AI – two of today’s hottest and most dynamic industries.
Interactions’ mission is to create amazing customer experiences by advancing AI technology that understands and engages on a human level. The human element of what we do not only relates to how we differentiate our AI technology, more importantly, it informs and guides our focus on our most valuable asset, our employees. We endeavor to create opportunities for our employees to advance their skills, their interests, their passions, their careers and their lives. Like all companies, we’re not perfect, but we are committed to continually improving our employee value proposition, one that centers on competitiveness, flexibility and an appreciation for individuality.
For prospective employees, if that sounds challenging and exciting, we’d love to talk to you.
The Information Security Engineer performs ongoing security operations tasks and help engineer and maintain security solutions across the organization. The Information Security Engineer also investigates and responds to incidents, escalating as necessary.
Essential Job Functions:
- Build, configure, deploy, troubleshoot/support, and document security solutions for multiple environments (cloud, hosted, on-premise)
- Implement and improve the company’s security authentication and log systems, including log aggregation, correlation, and analysis and automated alerting and prioritization
- Continuously monitor and analyze systems for security incidents, investigating, resolving, reporting, and escalating as needed
- Develop technical solutions to help mitigate security vulnerabilities and automate tasks to increase operational efficiency
- Design and establish continuous monitoring programs using cybersecurity monitoring, vulnerability scanning, and intrusion detection and management tools
- Identify opportunities to improve the quality and resiliency of the company’s systems and applications
- Research and recommend solutions to improve the company’s security posture on premise and in the cloud
- Partner with operations and infrastructure engineering teams to implement and tune security monitoring, security tooling and security reporting
- Actively participate in DR/BC planning and implementation.
Other Duties and Responsibilities:
Other networking and telephony related infrastructure tasks as required.
Preparation, Knowledge, Skills and Abilities:
- B.S. degree in Computer Science, Information Security or STEM related field. SANS GIAC: GCIH, GMON, GTCI or CEH – Certified Ethical Hacker (CEH)
- 3-5+ years of professional information and IT security experience with a passion for cybersecurity
- Excellent vulnerability, intrusion, and incident assessment, remediation, and management skills
- Fluency in scripting or querying languages (e.g., PowerShell, Perl, Python, WMI, VBScript, SQL)
- Detailed hands-on working knowledge of security technologies (e.g., AV, IDS/IPS, NGFW, SIEM,
- WAF, DLP, and malware analysis and protection), with a commitment to keep current with the latest developments in this field
- Experience in identity management/authorization and authentication (e.g., SSL, IPSEC, PKI,SAML, Kerberos, LDAP)
- Strong familiarity with Windows and Linux OS
- Thorough understanding of computer networking, IP, routing protocols, OSI model etc.
- AWS and cloud platform as a service (PaaS) security
- Practical experience automating security testing tools
- Strong analytical and troubleshooting skills driven by a logical, methodical approach
- Excellent interpersonal, communication, and leadership skills
- Self-starter, resourceful and intellectually curious
- Natural ability to be transparent and open to feedback
- Sense of urgency without sacrificing quality
- Collaborative, team player with high standards and ethics