Job description
Who We Are
Legato Security is an information security firm founded upon the belief that every organization has the right to keep its data private and secure. Our mission is to build close partnerships with our clients, serving them not as just a vendor, but as trusted advisors helping to build effective, proactive plans. Our focus is always on both the technical and human elements within an organization. We believe in comprehensive strategies designed to harden networks, deflect attackers, and rapidly recover from any accidents. As technology progresses, so do our tactics, ensuring our experts are always prepared to serve forward-looking leaders eager to stay ahead of emerging threats.
Position Overview
As an Endpoint Detection and Response (EDR) Engineer, you will help design, deploy, configure, optimize, and validate next-generation endpoint security solutions for customers. You’ll work with in-house teams (including Security Engineers, and SOC Analysts) to identify the right mix of tools, techniques, and procedures to translate our customer’s needs and future goals into a plan that will enable secure and effective solutions. In determining the best solutions, you will investigate new techniques, break free from the legacy model, and help customers exceed industry standards. As a team, we’ll take a critical approach to solution design, identifying gaps, providing alternatives, and customizing solutions to maintain a balance of security and business needs. This position is open to remote delivery anywhere within the U.S.
Specific Job Responsibilities
- Implement EDR solutions according to vendor best practices
- Assist SOC analysts in performing analysis, correlation of actionable security events and alerts, network traffic analysis using raw packet data, net flow, etc. provided by EDR solution
- Evaluate, analyze and reproduce security vulnerabilities reported by EDR vendors
- Partner and collaborate with customers and fellow engineers to design, implement, and monitor EDR solutions used both internally and in customer sites.
- Participate in the Security Incident Response Team (SIRT) activities. This means helping SIRT to detect, respond, contain, eradicate and recover from security incidents in a timely manner, within the EDR products
- Assist in documenting Standard Operating Procedures SOC playbooks, configuration guides, and secure standards
- Administration and operational support of all internal and client EDR solutions
- Provide technical support and troubleshooting when needed regarding existing or new EDR solutions
- Provide support to remediate vulnerabilities such as patching, implementing controls to mitigate risk, and ensuring secure configuration of systems pertaining to EDR
- Perform research and remain aware of new and emerging threats to ensure newly discovered vulnerabilities are addressed within specified EDR solutions
Qualifications
Required Qualifications:
- 3+ years of experience with deployment, configuration, or maintenance of supporting enterprise EDR solutions, including CrowdStrike Falcon, SentinelOne, Cortex XDR, or Carbon Black EDR as either deployment or day-to-day operations, and maintenance of the solution. Strong preference will be given to candidates with experience in more than one of the listed platforms.
3+ years of experience with performing systems administration, including basic troubleshooting and installation, monitoring system performance or availability, performing security upgrades, and optimizing solution configurations to meet the needs of operational users
2+ years of experience in working with a Security Operations Center (SOC) environment, leveraging EDR tools to support incident response, vulnerability scanning, threat hunting, network monitoring and log management, and compliance management activities highly desired
2+ years of experience in working with SYSMON as an alternative to an Enterprise EDR solution highly desired
2+ years of experience with deployment of an EDR solution in a customer and/or enterprise environment
Experience with optimization of EDR solutions, including refinement data produced, development of automated workflows or playbooks, and integration of the EDR data with Enterprise solutions, including SIEM, ITSM, and TIP solutions
Ability to provide content on deliverables, including written reports and technical documents, SOPs and configuration guides, and training and briefing materials
Bachelor’s degree or similar industry experience in cyber security, information technology, computer science, or similar field
Solid understanding of information technology and information security including; firewalls/UTM’s, IDS/IPS, VPN’s, penetration testing, SIEM, and other security systems with an emphasis on threat hunting and log analysis
Excellent written and verbal communication skills; collaborative team player
Exceptional analytical and problem-solving skills; someone who ‘sees’ the box differently
Experience developing and managing remediation plans/corrective actions
Understanding of IT infrastructure, information security, and compliance controls
Comfortable with multiple, current operating environments
Familiarity with modern exploit techniques, mitigation strategies and counter-attack methodologies
This position has the potential to be shift-based in a 24x7 operation
Preferred Qualifications:
- 5+ years of focused CrowdStrike Falcon or SentinelOne experience
- Experience with triaging security events in a SOC environment and leveraging data collected from enterprise security solutions
- Experience with providing support in a Tier I or II IT operations and maintenance role, including ticket work information updates, issue responses, and remediation
- Knowledge of federal information security policies, standards, procedures, directives, frameworks, federal security authorizations, assessment, and risk management processes for enterprise systems
- Ability to integrate cybersecurity data using enterprise or custom tools data aggregation and analysis tools, including Sumo Logic, Splunk, QRadar, Microsoft Sentinel, etc.
- Bachelor’s degree in Information Systems, Cybersecurity, or similar
- CISSP, CISM, CISA, GIAC or other recognized security certification is preferred
Perks
- Start-up company in a growth phase with opportunity for advancement based on performance
- Start-up culture with an office in downtown Salt Lake City, UT
- Competitive medical and dental benefits for employee and family members
- Other company-provided benefits such as short-term disability, basic life insurance, children’s orthodontia, with additional voluntary benefits available, and 401(k) match
- Flexible Paid Time Off policy
- Professional Development opportunities specific to role
E04JI8008a6v401bps2
www.colinoncars.com is the go-to platform for job seekers looking for the best job postings from around the web. With a focus on quality, the platform guarantees that all job postings are from reliable sources and are up-to-date. It also offers a variety of tools to help users find the perfect job for them, such as searching by location and filtering by industry. Furthermore, www.colinoncars.com provides helpful resources like resume tips and career advice to give job seekers an edge in their search. With its commitment to quality and user-friendliness, www.colinoncars.com is the ideal place to find your next job.