Experience Inc. Jobs

Job Information

AT&T Cyber Security Engineer in El Segundo, California

AT&T DIRECTV is an industry leader in connecting viewers with entertainment on any screen wherever they are.The Entertainment Group is at the tip of the spear of delivering these cutting-edge products to consumers and ensuring that they are deployed with the appropriate Risk Management controls in place to provide the highest level of quality to our customers world-wide.We are seeking highly motivated individuals with a desire to learn about the complex environment that is behind our video products and use their knowledge to identify ways to simplify the way these products are managed, monitored, and deployed. We looking for a Cyber Security Engineer.

Cyber Security Engineer will do the following:

  • Partake in technical design reviews, integration, testing, and documentation work

  • Responsible for technical advisory to research teams

  • Update, sustain, and administer a high level of security for in-house security infrastructures

  • Run vulnerability valuation and fizzing of protocols, hardware, and software

  • Apply system security engineering principles to deliver real solutions premeditated to enhance the security position

  • Identify threats and develop suitable defense measures, evaluate system changes for security implications, and recommend enhancements, research, and draft cyber security white papers, and provide first-class support to the cyber security operations staff for resolving difficult cyber security issues

  • Write Risk Management Framework (RMF)-based policies and procedures, and develop comprehensive cyber security processes to contain implementation

  • Manage and lead security incident response efforts

  • Configure Windows and Linux host-based security as well as network and cloud-based security systems

  • Support with the installation and configuration of network security architectures, including firewalls, router ACLs (Access Control Lists), web content filters and Demilitarized Zones (DMZ)

  • Observe and respond to Intrusion Detection System (IDS) cues and anti-virus alerts..Key dutieso Develop and carry out information security plans and policieso Develop strategies to respond to and recover from a security breacho Develop or implement open-source/third-party tools to assist in detection, prevention and analysis of security threatso Awareness training of the workforce on information security standards, policies and best practices and implement protectionso Installation and use of firewalls, data encryption and other security products and procedureso Conduct periodic network scans to find any vulnerabilityo Conduct penetration testing, simulating an attack on the system to find exploitable weaknesseso Monitor networks and systems for security breaches, through the use of software that detects intrusions and anomalous system behavior, Investigates security breacheso Lead incident response, including steps to minimize the impact and then conducting a technical and forensic investigation into how the breach happened and the extent of the damage

Key technical skills include

• Expertise in anti-virus software, intrusion detection, firewalls and content filtering

• Knowledge of risk assessment tools, technologies and methods

• Expertise in designing secure networks, systems and application architectures

• Disaster recovery, computer forensic tools, technologies and methods

• Planning, researching and developing security policies, standards and procedures

• System administration, supporting multiple platforms and applications

• Expertise with mobile code, malicious code, and anti-virus software

• Endpoint security solutions, including file integrity monitoring and data loss prevention

• AWS and cloud platform as a service (PaaS) security

• Automating security testing tools, Chef, Git

Requirements –

  • 3 years plus of experience identifying threats and developing appropriate protection measures

  • Ability to review system changes for security implications and recommending improvements

  • Understanding of cyber security methodologies

  • Proficient in Java, Net, C++, Python, bash, power shell

  • Good team player, self-confident, motivated, and independent

  • Bachelor’s degree or equivalent in Computer engineering/science preferred

  • Current knowledge of technology capabilities and trends; types, and techniques of hacking attacks in the wild

  • Understanding of the OSI (Open Systems Interconnection) model and renowned ports and services can be an added advantage

  • Significant networking experience with the TCP/IP (Transmission Control Protocol/Internet Protocol) stack can be an added advantage

  • Veteran enterprise-level security strategic planning experience can be an added advantage

  • Knowledge of DoD (Department of Defense) 8500 series Risk Management Framework (RMF) processes can be an added advantage.

  • One of five potential security-related certifications or capacity to acquire a Public Trust security clearance can be an added advantage

  • Certified Information Systems Security Professional (CISSP)

  • CISA – Certified Information Systems Auditor (CISA)

  • CEH – Certified Ethical Hacker (CEH)

  • CISM – Certified Information Security Manager (CISM)

  • ISSAP – Information Systems Security Architecture Professional (ISSAP)

  • ISSEP – Information Systems Security Engineering Professional (ISSEP)