Senior Network Security Engineer

Verizon Verizon · Telecom · Southlake, TX +3

This role is for a Senior Network Security Engineer at Verizon. The primary responsibilities include real-time threat monitoring and detection using SIEM tools, leading incident response efforts, managing vulnerability management lifecycles, defining and implementing security architecture, and advanced threat hunting. The role also involves automation and scripting to enhance cybersecurity tooling. The ideal candidate will have a strong foundation in incident response, expertise in Splunk, and experience with automation playbooks.

What you'd actually do

  1. Identifying technology gaps to lead in the design, architecture, and implementation of appropriate security solutions.
  2. Creating formal guidelines, policies, and procedures to ensure smooth and error-free operations.
  3. Implementing strategic solutions in a highly scalable environment.
  4. Partner across the Operations, Engineering, and Planning organizations to ensure secure design patterns are embedded into new deployments and major changes
  5. Working independently on strategic technical challenges.

Skills

Required

  • Bachelor’s degree or four or more years of relevant work experience
  • Familiarity with Identity and Access Management (IAM) solutions.
  • Strong foundational knowledge of incident response lifecycles (NIST or SANS)
  • experience designing, testing, and maintaining automation playbooks using SOAR platforms
  • Expert-level ability to write complex, optimized SPL (Splunk Search Language) searches
  • In-depth experience with risk-based alerting, managing notable events, asset/identity correlation, and defining/tuning correlation searches.
  • Experience in developing, testing, and maintaining automation playbooks using Python/API integrations and Splunk SOAR

Nice to have

  • Certifications such as CCSP, CySA+, GSOC, GCDA, Cisco Certified CyberOps or equivalent SIEM/SOC certifications
  • Experience with networking (especially Internet-related protocols), and network and information security.
  • Networking certifications such as Juniper JNCIS, JNCIA, Cisco CCNP, or CCNA.
  • Strong working knowledge of incident response frameworks and methodologies like NIST 800-61 and MITRE ATT&CK
  • Experience with big-data analytical tools, such as Elasticsearch, for automating security deployments and compliance checks.
  • Ability to run & interpret network scans using tools such as Tenable Nessus, Qualys, Rapid7 InsightVM, or OpenVAS.
  • Ability to interpret CVSS scores and prioritize risk.
  • Four or more years of hands-on experience working with internet-scale data sets such as Netflow, BGP, DNS, and IDS logs.
  • Knowledge and experience in one or more of statistics, data visualization, anomaly detection, machine learning, and system administration.
  • Knowledge of network-based, system-level, and application-layer attacks and mitigation methods.
  • Experience with a variety of leading SQL and NoSQ

What the JD emphasized

  • Expert-level ability to write complex, optimized SPL (Splunk Search Language) searches
  • Four or more years of hands-on experience working with internet-scale data sets such as Netflow, BGP, DNS, and IDS logs.