Senior Network Security Defense Engineer

Verizon Verizon · Telecom · Branchburg, NJ +3

Senior Network Security Defense Engineer responsible for owning the security lifecycle and effectiveness across networks and systems. This role involves real-time threat monitoring using SIEM tools, leading incident response, managing vulnerability management, defining security architecture, and advanced threat hunting. Requires expertise in Splunk SPL, incident response lifecycles, vulnerability remediation, and risk-based alerting. Experience with AI LLMs for scripting/automation is a plus.

What you'd actually do

  1. Identifying technology gaps to lead in the design, architecture, and implementation of appropriate security solutions.
  2. Creating formal guidelines, policies, and procedures to ensure smooth and error-free operations.
  3. Implementing strategic solutions in a highly scalable environment.
  4. Partnering across the Operations, Engineering, and Planning organizations to ensure secure design patterns are embedded into new deployments and major changes.
  5. Working independently on strategic technical challenges.

Skills

Required

  • Splunk SPL
  • Incident response lifecycles (NIST or SANS)
  • Vulnerability management
  • Risk-based alerting
  • Data Science & Querying

Nice to have

  • CompTIA Security+
  • CISSP
  • CCIP
  • CISM
  • CCSP
  • OSCP
  • CEH
  • Identity and Access Management (IAM)
  • AI large language models for scripting and/or automation
  • Linux systems engineering
  • Encryption for data in transit
  • PCNSE
  • CCNP
  • CCNA
  • 4G/5G wireless network functions
  • OpenStack
  • Kubernetes

What the JD emphasized

  • Ability to write complex, optimized Splunk SPL (Search Processing Language) searches, including macros, data models, and lookups for efficient threat hunting and investigation.
  • Knowledge of incident response lifecycles (NIST or SANS) with experience designing, testing, and maintaining automation playbooks using SOAR platforms to automate triage and response actions.
  • Proficiency in the continuous, rigorous process of reviewing and remediating vulnerabilities based on the Common Vulnerabilities and Exposures (CVE) database and CISA's Known Exploited Vulnerabilities (KEV) catalog.