Information Security Engineer II - Anywhere in the US Law Enforcement & Security - Littleton, CO at Geebo

Information Security Engineer II - Anywhere in the US

About Lumen
Lumen is guided by our belief that humanity is at its best when technology advances the way we live and work. With 450,000 route fiber miles serving customers in more than 60 countries, we deliver the fastest, most secure global platform for applications and data to help businesses, government and communities deliver amazing experiences. Learn more about Lumen s network, edge cloud, security and communication and collaboration solutions and our purpose to further human progress through technology at news.lumen.com, LinkedIn:
/lumentechnologies, Twitter:
@lumentechco, Facebook:
/lumentechnologies, Instagram:
@lumentechnologies and YouTube:
/lumentechnologies.

The Role

The Information Security Engineer II on the Cybersecurity Vulnerability Assessment Services (CVAS) team within Enterprise Security is primarily responsible for identifying, establishing, enhancing, and performing operational functions of vulnerability management. Operational functions include establishing and maintaining scanning capabilities, identifying vulnerabilities through scanning capabilities, and providing remediation oversight of vulnerabilities on Lumen servers, databases, applications, network elements, and other systems across the corporate enterprise. The engineer is responsible to assist with realizing strategic security initiatives to improve the team capabilities associated with vulnerability management and vulnerability scanning methodology.

The engineer must possess general knowledge of cybersecurity threats, vulnerabilities, and technologies. The engineer must possess broad knowledge of Information Security and Information Technology (IT) systems as well as a reasonable understanding of all disciplines of networking, programming, application development, and system administration. The engineer must have effective oral and written communication skills to provide remediation oversight of vulnerabilities, document team procedures and processes, and assist with documents intended for executive review and approvals. The engineer must be able to work independently, as well as collaboratively with others, to foster consulting relationships with internal partners.

The Main Responsibilities

  • Perform operational support of vulnerability management systems and applications that the CVAS team is responsible to maintain and define documented procedures and processes.
  • Coordinate and lead routine vulnerability scanning and remediation oversight on Lumen systems as required for compliance of Payment Card Industry Data Security Standard (PCI DSS), Cybersecurity Maturity Model Certification (CMMC), and other industry compliance standards as necessary.
  • Contribute to realize strategic security initiatives to improve vulnerability management and vulnerability scanning capabilities through automation development, processes enhancements, and infrastructure expansion.
  • Identify deficiencies within vulnerability management and vulnerability scanning tools, procedures, and processes and provide recommendations for improvement and automation.
  • Create reports and generate vulnerability metrics for executive management levels to utilize in making informed business decisions that impact the security of Lumen and its customers.
  • Identify vulnerabilities on Lumen systems through vulnerability scanning for Lumen infrastructures, products, and services encompassing network elements, operating systems, databases, and applications across the corporate enterprise.
  • Contribute to develop, facilitate, and maintain the Information Security Policy, Methods & Procedures, Technical Standards, Technical Best Practices, and general processes for vulnerability management.
  • Represent Corporate Security as a Subject Matter Expert (SME) regarding Lumen vulnerability scanning capabilities and methodologies.
  • Oversee the response to High severity vulnerabilities that impact Lumen systems by analyzing the vulnerabilities, identifying systems impacted, and collaborating with system owners to communicate the risk of vulnerabilities, establish remediation priority, and validate remediation efforts.
  • Instill a security culture company-wide through vulnerability awareness and remediation mindset.

What We Look For in a Candidate

  • Undergraduate degree in Information Security, Computer Science, Computer Engineering, or related field, or equivalent experience.
  • 2
    years experience in Information Security
  • Experience utilizing multiple vulnerability scanning tools and platforms.
  • Knowledge of current and emerging cybersecurity threats, vulnerabilities, and technologies.
  • Awareness of NIST Vulnerability Database pertaining to vulnerability severity ratings.
  • General understanding of common networking protocols.
  • General understanding and experience of UNIX derivative operating system distributions as well as various Windows operating systems.
  • Effective oral and written communication skills and comfort with presenting technical issues to all levels of management, as well as non-technical staff.
  • Preferred
    Qualifications:
  • Applied experience performing vulnerability scanning and vulnerability management functions for medium to large enterprises encompassing network elements/protocols, operating systems, databases, and applications including systems in scope for a compliance standard.
  • Applied experience with OWASP Top 10, SANS Top 20, and NIST Vulnerability Database.
  • Basic knowledge of programming languages such as Python, GoLand or UNIX Shell.
  • Strong understanding of network architecture and switching/routing implementation as it relates to scanner placement.
  • Awareness of information security industry and regulatory obligations (PCI, FISMA, HIPAA, ISO 27001/27002, NIST Framework, CMMC) pertaining to vulnerability management.

What to Expect Next

Requisition #:
249087

EEO Statement
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, marital status, family status, pregnancy, or other legally protected status (collectively, protected statuses ). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.

Disclaimer
The above job definition information has been designed to indicate the general nature and level of work performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of employees assigned to this job. Job duties and responsibilities are subject to change based on changing business needs and conditions.

Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.