Senior Network Security Engineer

Verizon Verizon · Telecom · Southlake, Texas, Ashburn, Virginia, Cary, North Carolina, Rolling Meadows, Illinois, Alpharetta, Georgia, Temple Terrace, Florida, Walnut Creek, California, Branchburg, New Jersey

Senior Network Security Engineer at Verizon responsible for advancing security posture through threat monitoring, incident response, vulnerability management, security architecture, and threat hunting. Requires expertise in SIEM tools, automation, and network security principles.

What you'd actually do

  1. Identifying technology gaps to lead in the design, architecture, and implementation of appropriate security solutions.
  2. Creating formal guidelines, policies, and procedures to ensure smooth and error-free operations.
  3. Implementing strategic solutions in a highly scalable environment.
  4. Partner across the Operations, Engineering, and Planning organizations to ensure secure design patterns are embedded into new deployments and major changes
  5. Working independently on strategic technical challenges.

Skills

Required

  • Identity and Access Management (IAM) solutions
  • Incident response lifecycles (NIST or SANS)
  • Automation playbooks using SOAR platforms
  • Splunk Search Language (SPL)
  • Risk-based alerting
  • Python/API integrations
  • Splunk SOAR

Nice to have

  • CCSP, CySA+, GSOC, GCDA, Cisco Certified CyberOps or equivalent SIEM/SOC certifications
  • Networking (especially Internet-related protocols)
  • Network and information security
  • Palo Alto PCNSE, Cisco CCNP, or CCNA
  • Incident response frameworks and methodologies like NIST 800-61 and MITRE ATT&CK
  • Big-data analytical tools (Elasticsearch)
  • Tenable Nessus, Qualys, Rapid7 InsightVM, or OpenVAS
  • CVSS scores
  • Netflow, BGP, DNS, and IDS logs
  • Statistics
  • Data visualization
  • Anomaly detection
  • Machine learning
  • System administration
  • Network-based, system-level, and application-layer attacks and mitigation methods
  • SQL and NoSQL technologies
  • UNIX or Linux systems engineering
  • Security tools

What the JD emphasized

  • Bachelor’s degree or four or more years of relevant work experience demonstrated through one or a combination of work and/or military experience, or specialized training.
  • Strong foundational knowledge of incident response lifecycles (NIST or SANS) with experience designing, testing, and maintaining automation playbooks using SOAR platforms to automate triage and response actions.
  • Expert-level ability to write complex, optimized SPL (Splunk Search Language) searches, including macros, data models, and lookups for efficient threat hunting and investigation.
  • In-depth experience with risk-based alerting, managing notable events, asset/identity correlation, and defining/tuning correlation searches.
  • Experience in developing, testing, and maintaining automation playbooks using Python/API integrations and Splunk SOAR (Security Orchestration, Automation, and Response) to automate triage and response actions.