[Close] 

Security Operations Engineer II

Title: Security Operations Engineer II
Job ID: 251
Location:
Warrenville, IL, US
Category: Information Technology
Description:
Donnelley Financial Solutions (NYSE: DFIN) provides software and services that enable clients to communicate with confidence in a complex regulatory environment. With 3,500 employees in 61 locations across 18 countries, we provide thousands of clients globally with innovative tools for content creation, management and distribution, as well as data analytics and multi-lingual translations services. Leveraging advanced technology, deep-domain expertise and 24/7 support, we deliver cost-effective solutions to meet the evolving needs of our clients.
Company Info
Donnelley Financial Solutions (DFS) is a leading financial communications services company. DFS serves capital market and investment market clients by delivering products and services to help create, manage and deliver accurate and timely financial communications to investors and regulators.
Short Description
Security Operations Engineer will be responsible for day-to- day support and maintenance of security infrastructure. Security Operations Engineer will be responsible for conducting eDiscovery activities, information security investigations, and acting on potential security and/or privacy breach issues. Maintains knowledge of changing technologies, and provides recommendations for adaptation of new technologies or policies. Recognizes and identifies potential areas where existing data security policies and procedures require change, or where new ones need to be developed, especially regarding future business expansion. Evaluates and recommends security products, services and/or procedures to enhance productivity and effectiveness.
Responsibilities
Responsible for day-to-day support and maintenance of security infrastructure systems such as LogRhythm, Radware DefensePro, Palo Alto Networks, Symantec Endpoint Protection, Anomali ThreatStream, Tanium, Empow Networks, EnCase and more
Provide technical expertise and guide the administration of security tools that control and monitor information security
Train teammates in the implementation of necessary computer security controls or new/upgraded security technology
Research, evaluate, design, test, recommend and plan implementation of new or improved information security software or devices.
Proactively protect the confidentiality, integrity, and availability of data in the custody of or processed by the company by responding in a timely manner to a loss or misuse of information assets
Lead investigations of suspected information security misuse or stemming from compliance reviews as requested and approved by the SVP-CISO
Required Skills
Bachelor degree with 5+ years of relevant work experience OR demonstrated ability to meet the job requirements through a comparable number of years of applicable work experience and education
Strong knowledge across multiple information security domains
CISSP, GIAC, and other relevant certifications highly desired
Knowledge of risk assessment procedures, policy formation, role-based authorization methodologies, authentication technologies and cyber-attack techniques
Experience or certification on common forensic tools
Scripting and web programming skills highly desired
Ability to relate business requirements and risks to technology implementation for security-related issues
Experience implementing, supporting, and/or maintaining PCI, ISO, AT101, and other security frameworks and certifications for medium and/or large enterprises
Technical proficiency in UNIX, DNS, Windows Server, Internet routing, TCP/IP protocols, Network technologies, and other foundational technology concepts
Ability to function as a respected subject matter expert and consultant to other IT and business groups
Self-driven, highly-motivated with a strong customer focus
Strong analytical and problem-solving skills
Solid project management skills, especially in a cross-functional environment
Deep level knowledge of Security Incident & Event Management platforms
Expert-level knowledge of next-generation firewall platforms, such as Palo Alto Networks, Fortinet, and Checkpoint.
Advanced-level knowledge of intrusion detection and/or prevention systems
Proven knowledge of Threat Intelligence architectures and technologies.
Advanced knowledge of cyber-attack techniques and exploits as well as mitigation strategies.
It is the policy of Donnelley Financial Solutions to select, place and manage all its employees without discrimination based on race, color, national origin, gender, age, religion, actual or perceived disability, veteran's status, actual or perceived sexual orientation, genetic information or any other protected status.
If you are a qualified individual with a disability or a disabled veteran, you have the right to request a reasonable accommodation if you are unable or limited in your ability to use or access jobs.dfsco.com as a result of your disability. You can request a reasonable accommodation by sending an email to AccommodationRequests@dfsco.com.



Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

IT Security Operations Team Lead
Chicago, IL Chicago Public Schools
Commercial Banking - Business Operations Analy...
Chicago, IL JPMorgan Chase
Infrastructure Operations Engineering
Chicago, IL Citadel/Surveyor
Sr. Network Operations Engineer
Chicago, IL CME Group
Regulatory Ops Developer and Analytics Operati...
Elgin, IL JPMorgan Chase