Engineer Ii, Security Engineer

Verizon Verizon · Telecom · Southlake, TX +3

Cybersecurity Engineer role focused on threat monitoring, incident response, vulnerability management, security architecture, and threat hunting using SIEM tools, automation, and scripting within Verizon's network infrastructure.

What you'd actually do

  1. Identifying technology gaps to lead in the design, architecture, and implementation of appropriate security solutions.
  2. Creating formal guidelines, policies, and procedures to ensure smooth and error-free operations.
  3. Implementing strategic solutions in a highly scalable environment.
  4. Partner across the Operations, Engineering, and Planning organizations to ensure secure design patterns are embedded into new deployments and major changes
  5. Assisting network security incident response activities including triage, containment, eradication, and recovery for disruptive threats

Skills

Required

  • Bachelor's degree or Four or more years of relevant work experience
  • Two or more years of relevant work experience
  • Familiarity with Identity and Access Management (IAM) solutions
  • Strong foundational knowledge of incident response lifecycles (NIST or SANS)
  • experience designing, testing, and maintaining automation playbooks using SOAR platforms
  • Strong ability to write complex, optimized SPL (Splunk Search Language) searches
  • In-depth experience with risk-based alerting, managing notable events, asset/identity correlation, and defining/tuning correlation searches
  • Experience in developing, testing, and maintaining automation playbooks using Python/API integrations and Splunk SOAR
  • Expert in conflict resolution and negotiation

Nice to have

  • Certifications such as CCSP, CySA+, GSOC, GCDA, Cisco Certified CyberOps or equivalent SIEM/SOC certifications
  • Experience with networking (especially Internet-related protocols), and network and information security
  • Networking certifications such as Palo Alto PCNSE, Cisco CCNP, or CCNA
  • Strong working knowledge of incident response frameworks and methodologies like NIST 800-61 and MITRE ATT&CK
  • Experience with big-data analytical tools, such as Elasticsearch
  • Ability to run & interpret network scans using tools such as Tenable Nessus, Qualys, Rapid7 InsightVM, or OpenVAS
  • Ability to interpret CVSS scores and prioritize risk

What the JD emphasized

  • real-time Threat Monitoring & Detection using SIEM tools like Splunk
  • leading Incident Response efforts
  • managing the continuous Vulnerability Management lifecycle
  • expertise in defining and implementing robust Security Architecture
  • advanced Threat Hunting skills
  • demonstrable experience in Automation & Scripting
  • Strong ability to write complex, optimized SPL (Splunk Search Language) searches
  • Experience in developing, testing, and maintaining automation playbooks using Python/API integrations and Splunk SOAR