Sr Security Engineer - Break Through Voice Tech - Burlington MA

Company Name:
The Bowdoin Group
A prestigious fast growing company in Burlington, MA is looking to hire a Senior Security Engineer. The Senior Security Engineer is responsible for providing technical and business advice for a wide variety of information security issues, concerns, and problems.
Job Description:
The Senior Security Engineer is responsible for providing technical and business advice for a wide variety of information security issues, concerns, and problems. Working individually, as well as part of various project teams, this role is an in-house subject matter expert who diligently assists with the improvement of technical security on information systems. A visible internal spokesperson for the Security Organization (NSO) this position is charged with facilitating compliance with the company's information security policies and standards. Reports to the Chief Security Officer.
The Senior Security Engineer works as part of the information security team to identify and implement secure solutions in support of Business Divisions.
Implementing IDS/IPS, log management, and related network security infrastructure and services;
Penetration testing applications, and other computing infrastructure; including Network Administrators, Systems Administrators, and Database Administrators.
Participating in vulnerability management program as a subject matter expert, providing guidance on vulnerability mitigation efforts, tool selection and implementation, and performing vulnerability identification
Participating in overall network penetration testing activity, including reviewing the results of third-party tests, as well performing internal tests of the network.
Conducting and/or support internal security risk assessments, as well as assessments of business partners.
Creating infrastructure technical security standards applicable to Business Divisions.
7 + years experience as an information security engineer. 3 + years experience performing penetration testing of network, application and IT resources. CISSP, or similar relevant information security certifications required.
In-depth knowledge of IT technologies including: ISO/IEC 7498-1, Routing & Switching in LAN/WAN architectures, WLAN, Radius, Firewalls, SSO/SAML, SaaS/Cloud Services, Identity Access Management, SDLC, Microsoft Technologies (Active Directory, IIS, ISA, DNS, SQL), Oracle, Solaris, Linux.
Knowledge and direct experience incorporating ISO 27002, NIST SP 800-53, CIS and other security control frameworks and standards.
Knowledge and direct experience with vulnerability management, SIEM and Log Management, file integrity, proxy servers, DLP, IPS/IDS, VPN, PKI, 2-actor authentication, cryptography.
Expertise using security technologies, RedSeal (must have) - Metasploit and Wireshark.
Knowledge and experience assessing information security risks against Sarbanes-Oxley, HIPAA, PCI-DSS, and other regulations and industry standards.
Bachelors in Computer Science, Information Assurance, or equivalent/related field.
CISSP, CISM, CISA, CEH, CEPT, GIAC or similar relevant information security certifications required.
To apply OR speak to a recruiter today: Call
Nick Congdon
The Bowdoin Group is always seeking new technical talent to staff project-based positions with our contracting clients. We work with companies throughout the greater Boston area in a variety of industries, providing them with just-enough, just-in-time workforce solutions for their technical projects and managing a seamless transition for our contractors between old and new projects. If you are a technical consultant in search of a new position, please reach out to us! We will be happy to work with you to locate the position that best matches your skills and personality.
Check out other positions we are looking to fill:

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.