4,984 Security Specialist jobs in the United States

Information Security Specialist

10261 New York, New York Sapient

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description


Job Description

The Information Security Officer is a senior level professional position responsible for driving efforts to prevent, monitor and respond to information/data breaches and cyber-attacks. The overall purpose of this role is to ensure the execution of Information Security (IS) directives and activities in alignment with client information and cybersecurity policy within the supported business units, primarily client s technology infrastructure.

Qualifications

Qualifications and Education:

  • Strong understanding of cloud security architectures (i.e. AWS Well-Architected Framework,Google Cloud Security Command Centre).
  • Knowledge of the Identity and Access management (IAM) security models of AWS and GCP.
  • In-depth knowledge of cloud infrastructure and architecture(e.g. VPC, EC2, S3, Cloud Storage and Compute Engine.
  • Familiarity with compliance and risk frameworks (NIST, ISO 27001, CSA STAR)
  • Experience in business engagement for Information Security, Risk or Control & Compliance, IT Analysis / Design or Program / Project Management.
  • Perform Information Security risk assessments and familiarity with Information Security Risk Governance.
  • At least 2 years' experience securing cloud environments particularly AWS and GCP
  • Bachelor's degree or higher (Computer Science or Cybersecurity preferred) or equivalent work experience.
  • Industry certifications such as CISSP/CISM/CCSP are desired.
  • Have good communication skills with the ability to articulate clearly in high stress situations.
  • Self-starter with good problem-solving skills.
  • Proven influencing and relationship management skills.
  • Familiarity with IaC security (Terraform, CloudFormation)
  • Advanced proficiency with Microsoft Office tools and software.
  • Public Cloud Solution Architect or Security Certifications are plus (i.e. AWS Certified Solution Architect, GCP Professional Cloud Security Engineer)


Additional Information

Annual Pay Range: USD 128,000 - USD 180,000

The range shown represents a grouping of relevant ranges currently used at Publicis Sapient.

The actual range for this position may differ, depending on location and the specific skillset required for the work itself. Benefits of Working Here: Flexible vacation policy; time is not limited, allocated, or accrued 16 paid holidays throughout the year Generous parental leave and new parent transition program Tuition reimbursement Corporate gift matching program As part of our dedication to an inclusive and diverse workforce.

Publicis Sapient is committed to Equal Employment Opportunity without regard for race, color, national origin, ethnicity, gender, protected veteran status, disability, sexual orientation, gender identity, or religion. We are also committed to providing reasonable accommodations for qualified individuals with disabilities and disabled veterans in our job application procedures.

If you need assistance or accommodation due to a disability, you may contact us at or you may call us at +1- .

Company Description

We at Publicis Sapient, enable our clients to thrive in Next and to create business value through expert strategies, customer-centric experience design, and world-class product engineering. The future of business is disruptive, transformative and becoming digital to the core.

In our 20 + years in IT, never before have we seen such a dire need for transformation in every major industry - from financial services to automotive, consumer products, retail, energy, and travel.

To make this transformative journey a reality in these exciting times, we seek Rockstars who will:

  • Brave it out to go do the next; "what will be" from "what is" exhibit the optimism that says there is no limit to what we can achieve deeply skilled, bold, collaborative, flexible.
  • Reimagine the way the world works to help businesses improve the daily lives of people and the world.
  • Our people thrive because of the belief that it is both our privilege and responsibility to usher our clients and the world into Next.
  • Our work is fueled by challenging boundaries, multidisciplinary collaboration, highly agile teams, and the power of the newest technologies and platforms.

If that's you, come talk to us! This is the world-class engineering team where you should build your career

View Now

Information Security Specialist

06112 Hartford, Connecticut Windstream Communications

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Windstream Holdings, Inc., is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the U.S.

  • Kinetic is a premier internet solutions provider on a mission to deliver ultra-fast, reliable internet to consumers and small businesses across the U.S., helping them Internet better™.

  • Windstream Enterprise is a leading managed services provider providing strategic communications and security products to mid-size businesses and enterprise clients.

  • Windstream Wholesale provides high-capacity, high-performance networking solutions and services to other telecom carriers, data centers, content providers and enterprises.

The Windstream team provides innovative software and network solutions to connect people and empower business in a world of infinite possibilities!

___

About the Role:

The Information Security Specialist is a crucial member of the Threat Detection and Response (TDR) team, dedicated to safeguarding the Windstream environment against cyber threats. This role involves a blend of expertise in cybersecurity tactics and an analytical mindset to detect, investigate, and mitigate potential security incidents. The Specialist will act as both a subject matter expert and a mentor, fostering knowledge and skills development within the team.

What You'll Do:

  • Alert Management: Detect and respond to security alerts from both TDR and third-party tooling.

  • Incident Handling: Coordinate a well-structured response to cybersecurity incidents to minimize their impact.

  • Expertise Provision: Serve as a subject matter expert in information security within the organization.

  • Mentorship: Provide guidance and help develop training plans for junior team members.

  • Tool Optimization: Oversee the review and tuning of rules for all TDR tools.

  • SIEM Enhancement: Continuously improve the SIEM system, adjust security tools, log ingestion, and rule sets in response to the evolving threat landscape.

  • Playbook Development: Create incident response playbooks based on SOC escalation metrics.

  • Automation and Streamlining: Develop and drive agile automation solutions to enhance detection capabilities, making use of Security Orchestration, Automation, and Response (SOAR) tools.

  • Threat Modeling: Conduct threat modeling exercises to maintain robust security postures.

  • Threat Hunting: Execute threat hunts on Common Vulnerabilities and Exposures (CVEs) and Indicators of Compromise (IOCs), ensuring effective monitoring.

  • Remediation Documentation: Document remediation strategies to neutralize threats and secure the environment.

  • Technical Escalation: Act as an escalation point for Tier I & II analysts or Managed Security Service Providers (MSSP).

  • Incident Response: Manage the entire incident response process, from initial alert to recovery and post-incident analysis.

  • Log Review and Engineering: Conduct log reviews and engineer the integration of log sources with security tools.

  • Policy and Documentation Maintenance: Ensure the creation and updating of cybersecurity service standards, documentation, and processes.

  • Incident Tracking: Formally document and track incidents from detection to resolution.

  • Performance Metrics: Develop metrics for Incident Response to foster process improvements.

  • Cyber Threat Intelligence: Collect and utilize threat intelligence to bolster defenses against known attack vectors.

  • Threat Classification: Prioritize threats based on intelligence and system alerts.

  • Compliance Assistance: Aid in artifact collection for compliance with standards such as PCI-DSS and SOX.

  • Team Exercises: Engage in Red/Blue team activities and participate in tabletop exercises.

  • Shift Availability: Availability to work on a 24x7 schedule to ensure continuous security coverage.

Do You Have:

  • Comprehensive knowledge of network protocols, devices, operating systems, cloud computing, and secure architecture, including proficiency in Windows, Linux, Azure, and Oracle Cloud.

  • Proficiency with SIEM, SOAR, IDS/IPS, EDR, Mail Gateways, Proxy, PKI, SYSLOG, and other network/security components.

  • Proven experience in incident response and remediation.

  • Familiarity with NIST Publications such as SP 800-53, 800-61, 800-70, 800-37.

  • Understanding of IT Security principles, techniques, and technologies.

  • Capability to conduct host and network analysis, including packet capture analysis.

  • In-depth knowledge of the MITRE ATT&CK Framework, and understanding of OWASP, Kill Chain, and other security frameworks.

  • Strong grasp of malware analysis concepts and methodologies.

  • Ability to independently manage initiatives with minimal oversight.

  • Ownership of toolsets or processes within the security domain.

  • Expertise in managing Incidents, Service Requests, Change, and Problem management processes.

  • Experience with current cyber threats and their exploitation tactics.

  • Exceptional analytical and problem-solving skills.

  • Excellent time management and organizational skills.

  • Quick learner for new technologies and concepts.

Must Haves:

Candidates must possess or be willing to obtain within the first 12 months of employment one of the following certifications: Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP) or SANS Global Information Assurance Certification (GCIH).

Physical Tasks - Standing Occasionally: 0-33% | Walking Occasionally: 0-33% |Sitting Continuously: 67-100% | Bending: Occasionally: 0-33% | Crouching: Occasionally: 0-33% | Pushing-Pulling: Occasionally: 0-33% | Carrying: Occasional: 0-33% | Reaching Above Head: Occasionally: 0-33% | Lifting-Lowering >1-15 lbs: Occasionally: 0-33% | Repetitive Hand Action: Medium Dexterity: Continuously: 67-100% | Fine Manipulating: frequently: 34% - 66%

Audio Visual Needs - Hearing: Continuously: 67-100%| Near Vision: Continuously: 67-100% | Far Vision: Occasionally: 0-33% | Peripheral Vision: Occasionally: 0-33%

Equipment Used in Job Performance : Computer, Printer, Telephone, Basic Office Supplies, Copier

___

Our Benefits:

  • Medical, Dental, Vision Insurance Plans

  • 401K Plan

  • Health & Flexible Savings Account

  • Life and AD&D, Spousal Life, Child Life Insurance Plans

  • Educational Assistance Plan

  • Identity Theft, Legal, Auto & Home and Pet Insurance

Windstream is an equal opportunity employer. At Windstream, we celebrate the authenticity and uniqueness of our people and their ideas. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, national origin, genetic information, protected veteran status, current military status, disability, sexual orientation, marital status, creed, citizenship status, or any other status protected by law, and to give full consideration to qualified disabled individuals and protected veterans.

Actual base pay for this job will depend on the candidate's primary work location and other factors, such as relevant skills and experience.

Notice to Non-U.S. Citizens: Windstream, as a holder of licenses granted by the Federal Communications Commission, is required to notify and to obtain approval from federal regulatory agencies prior to granting certain system/network access to any non-U.S. citizen personnel. Offers of employment extended to non-U.S. citizens are contingent upon receiving the requisite approval from agencies overseeing compliance. Non-U.S. citizens are required to provide Windstream with the personal identifying information required to obtain the necessary approval prior to accessing certain systems and/or Windstream’s network. If you are not a U.S. citizen, please notify your recruiter or email as soon as possible for information on Windstream’s foreign personnel disclosure and approval requirements.

Job Details

Job Family IT

Job Function Information Security

Pay Type Salary

View Now

Information Security Specialist

30383 Atlanta, Georgia Windstream Communications

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Windstream Holdings, Inc., is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the U.S.

  • Kinetic is a premier internet solutions provider on a mission to deliver ultra-fast, reliable internet to consumers and small businesses across the U.S., helping them Internet better™.

  • Windstream Enterprise is a leading managed services provider providing strategic communications and security products to mid-size businesses and enterprise clients.

  • Windstream Wholesale provides high-capacity, high-performance networking solutions and services to other telecom carriers, data centers, content providers and enterprises.

The Windstream team provides innovative software and network solutions to connect people and empower business in a world of infinite possibilities!

___

About the Role:

The Information Security Specialist is a crucial member of the Threat Detection and Response (TDR) team, dedicated to safeguarding the Windstream environment against cyber threats. This role involves a blend of expertise in cybersecurity tactics and an analytical mindset to detect, investigate, and mitigate potential security incidents. The Specialist will act as both a subject matter expert and a mentor, fostering knowledge and skills development within the team.

What You'll Do:

  • Alert Management: Detect and respond to security alerts from both TDR and third-party tooling.

  • Incident Handling: Coordinate a well-structured response to cybersecurity incidents to minimize their impact.

  • Expertise Provision: Serve as a subject matter expert in information security within the organization.

  • Mentorship: Provide guidance and help develop training plans for junior team members.

  • Tool Optimization: Oversee the review and tuning of rules for all TDR tools.

  • SIEM Enhancement: Continuously improve the SIEM system, adjust security tools, log ingestion, and rule sets in response to the evolving threat landscape.

  • Playbook Development: Create incident response playbooks based on SOC escalation metrics.

  • Automation and Streamlining: Develop and drive agile automation solutions to enhance detection capabilities, making use of Security Orchestration, Automation, and Response (SOAR) tools.

  • Threat Modeling: Conduct threat modeling exercises to maintain robust security postures.

  • Threat Hunting: Execute threat hunts on Common Vulnerabilities and Exposures (CVEs) and Indicators of Compromise (IOCs), ensuring effective monitoring.

  • Remediation Documentation: Document remediation strategies to neutralize threats and secure the environment.

  • Technical Escalation: Act as an escalation point for Tier I & II analysts or Managed Security Service Providers (MSSP).

  • Incident Response: Manage the entire incident response process, from initial alert to recovery and post-incident analysis.

  • Log Review and Engineering: Conduct log reviews and engineer the integration of log sources with security tools.

  • Policy and Documentation Maintenance: Ensure the creation and updating of cybersecurity service standards, documentation, and processes.

  • Incident Tracking: Formally document and track incidents from detection to resolution.

  • Performance Metrics: Develop metrics for Incident Response to foster process improvements.

  • Cyber Threat Intelligence: Collect and utilize threat intelligence to bolster defenses against known attack vectors.

  • Threat Classification: Prioritize threats based on intelligence and system alerts.

  • Compliance Assistance: Aid in artifact collection for compliance with standards such as PCI-DSS and SOX.

  • Team Exercises: Engage in Red/Blue team activities and participate in tabletop exercises.

  • Shift Availability: Availability to work on a 24x7 schedule to ensure continuous security coverage.

Do You Have:

  • Comprehensive knowledge of network protocols, devices, operating systems, cloud computing, and secure architecture, including proficiency in Windows, Linux, Azure, and Oracle Cloud.

  • Proficiency with SIEM, SOAR, IDS/IPS, EDR, Mail Gateways, Proxy, PKI, SYSLOG, and other network/security components.

  • Proven experience in incident response and remediation.

  • Familiarity with NIST Publications such as SP 800-53, 800-61, 800-70, 800-37.

  • Understanding of IT Security principles, techniques, and technologies.

  • Capability to conduct host and network analysis, including packet capture analysis.

  • In-depth knowledge of the MITRE ATT&CK Framework, and understanding of OWASP, Kill Chain, and other security frameworks.

  • Strong grasp of malware analysis concepts and methodologies.

  • Ability to independently manage initiatives with minimal oversight.

  • Ownership of toolsets or processes within the security domain.

  • Expertise in managing Incidents, Service Requests, Change, and Problem management processes.

  • Experience with current cyber threats and their exploitation tactics.

  • Exceptional analytical and problem-solving skills.

  • Excellent time management and organizational skills.

  • Quick learner for new technologies and concepts.

Must Haves:

Candidates must possess or be willing to obtain within the first 12 months of employment one of the following certifications: Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP) or SANS Global Information Assurance Certification (GCIH).

Physical Tasks - Standing Occasionally: 0-33% | Walking Occasionally: 0-33% |Sitting Continuously: 67-100% | Bending: Occasionally: 0-33% | Crouching: Occasionally: 0-33% | Pushing-Pulling: Occasionally: 0-33% | Carrying: Occasional: 0-33% | Reaching Above Head: Occasionally: 0-33% | Lifting-Lowering >1-15 lbs: Occasionally: 0-33% | Repetitive Hand Action: Medium Dexterity: Continuously: 67-100% | Fine Manipulating: frequently: 34% - 66%

Audio Visual Needs - Hearing: Continuously: 67-100%| Near Vision: Continuously: 67-100% | Far Vision: Occasionally: 0-33% | Peripheral Vision: Occasionally: 0-33%

Equipment Used in Job Performance : Computer, Printer, Telephone, Basic Office Supplies, Copier

___

Our Benefits:

  • Medical, Dental, Vision Insurance Plans

  • 401K Plan

  • Health & Flexible Savings Account

  • Life and AD&D, Spousal Life, Child Life Insurance Plans

  • Educational Assistance Plan

  • Identity Theft, Legal, Auto & Home and Pet Insurance

Windstream is an equal opportunity employer. At Windstream, we celebrate the authenticity and uniqueness of our people and their ideas. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, national origin, genetic information, protected veteran status, current military status, disability, sexual orientation, marital status, creed, citizenship status, or any other status protected by law, and to give full consideration to qualified disabled individuals and protected veterans.

Actual base pay for this job will depend on the candidate's primary work location and other factors, such as relevant skills and experience.

Notice to Non-U.S. Citizens: Windstream, as a holder of licenses granted by the Federal Communications Commission, is required to notify and to obtain approval from federal regulatory agencies prior to granting certain system/network access to any non-U.S. citizen personnel. Offers of employment extended to non-U.S. citizens are contingent upon receiving the requisite approval from agencies overseeing compliance. Non-U.S. citizens are required to provide Windstream with the personal identifying information required to obtain the necessary approval prior to accessing certain systems and/or Windstream’s network. If you are not a U.S. citizen, please notify your recruiter or email as soon as possible for information on Windstream’s foreign personnel disclosure and approval requirements.

Job Details

Job Family IT

Job Function Information Security

Pay Type Salary

View Now

Information Security Specialist

08628 West Trenton, New Jersey Windstream Communications

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Windstream Holdings, Inc., is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the U.S.

  • Kinetic is a premier internet solutions provider on a mission to deliver ultra-fast, reliable internet to consumers and small businesses across the U.S., helping them Internet better™.

  • Windstream Enterprise is a leading managed services provider providing strategic communications and security products to mid-size businesses and enterprise clients.

  • Windstream Wholesale provides high-capacity, high-performance networking solutions and services to other telecom carriers, data centers, content providers and enterprises.

The Windstream team provides innovative software and network solutions to connect people and empower business in a world of infinite possibilities!

___

About the Role:

The Information Security Specialist is a crucial member of the Threat Detection and Response (TDR) team, dedicated to safeguarding the Windstream environment against cyber threats. This role involves a blend of expertise in cybersecurity tactics and an analytical mindset to detect, investigate, and mitigate potential security incidents. The Specialist will act as both a subject matter expert and a mentor, fostering knowledge and skills development within the team.

What You'll Do:

  • Alert Management: Detect and respond to security alerts from both TDR and third-party tooling.

  • Incident Handling: Coordinate a well-structured response to cybersecurity incidents to minimize their impact.

  • Expertise Provision: Serve as a subject matter expert in information security within the organization.

  • Mentorship: Provide guidance and help develop training plans for junior team members.

  • Tool Optimization: Oversee the review and tuning of rules for all TDR tools.

  • SIEM Enhancement: Continuously improve the SIEM system, adjust security tools, log ingestion, and rule sets in response to the evolving threat landscape.

  • Playbook Development: Create incident response playbooks based on SOC escalation metrics.

  • Automation and Streamlining: Develop and drive agile automation solutions to enhance detection capabilities, making use of Security Orchestration, Automation, and Response (SOAR) tools.

  • Threat Modeling: Conduct threat modeling exercises to maintain robust security postures.

  • Threat Hunting: Execute threat hunts on Common Vulnerabilities and Exposures (CVEs) and Indicators of Compromise (IOCs), ensuring effective monitoring.

  • Remediation Documentation: Document remediation strategies to neutralize threats and secure the environment.

  • Technical Escalation: Act as an escalation point for Tier I & II analysts or Managed Security Service Providers (MSSP).

  • Incident Response: Manage the entire incident response process, from initial alert to recovery and post-incident analysis.

  • Log Review and Engineering: Conduct log reviews and engineer the integration of log sources with security tools.

  • Policy and Documentation Maintenance: Ensure the creation and updating of cybersecurity service standards, documentation, and processes.

  • Incident Tracking: Formally document and track incidents from detection to resolution.

  • Performance Metrics: Develop metrics for Incident Response to foster process improvements.

  • Cyber Threat Intelligence: Collect and utilize threat intelligence to bolster defenses against known attack vectors.

  • Threat Classification: Prioritize threats based on intelligence and system alerts.

  • Compliance Assistance: Aid in artifact collection for compliance with standards such as PCI-DSS and SOX.

  • Team Exercises: Engage in Red/Blue team activities and participate in tabletop exercises.

  • Shift Availability: Availability to work on a 24x7 schedule to ensure continuous security coverage.

Do You Have:

  • Comprehensive knowledge of network protocols, devices, operating systems, cloud computing, and secure architecture, including proficiency in Windows, Linux, Azure, and Oracle Cloud.

  • Proficiency with SIEM, SOAR, IDS/IPS, EDR, Mail Gateways, Proxy, PKI, SYSLOG, and other network/security components.

  • Proven experience in incident response and remediation.

  • Familiarity with NIST Publications such as SP 800-53, 800-61, 800-70, 800-37.

  • Understanding of IT Security principles, techniques, and technologies.

  • Capability to conduct host and network analysis, including packet capture analysis.

  • In-depth knowledge of the MITRE ATT&CK Framework, and understanding of OWASP, Kill Chain, and other security frameworks.

  • Strong grasp of malware analysis concepts and methodologies.

  • Ability to independently manage initiatives with minimal oversight.

  • Ownership of toolsets or processes within the security domain.

  • Expertise in managing Incidents, Service Requests, Change, and Problem management processes.

  • Experience with current cyber threats and their exploitation tactics.

  • Exceptional analytical and problem-solving skills.

  • Excellent time management and organizational skills.

  • Quick learner for new technologies and concepts.

Must Haves:

Candidates must possess or be willing to obtain within the first 12 months of employment one of the following certifications: Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP) or SANS Global Information Assurance Certification (GCIH).

Physical Tasks - Standing Occasionally: 0-33% | Walking Occasionally: 0-33% |Sitting Continuously: 67-100% | Bending: Occasionally: 0-33% | Crouching: Occasionally: 0-33% | Pushing-Pulling: Occasionally: 0-33% | Carrying: Occasional: 0-33% | Reaching Above Head: Occasionally: 0-33% | Lifting-Lowering >1-15 lbs: Occasionally: 0-33% | Repetitive Hand Action: Medium Dexterity: Continuously: 67-100% | Fine Manipulating: frequently: 34% - 66%

Audio Visual Needs - Hearing: Continuously: 67-100%| Near Vision: Continuously: 67-100% | Far Vision: Occasionally: 0-33% | Peripheral Vision: Occasionally: 0-33%

Equipment Used in Job Performance : Computer, Printer, Telephone, Basic Office Supplies, Copier

___

Our Benefits:

  • Medical, Dental, Vision Insurance Plans

  • 401K Plan

  • Health & Flexible Savings Account

  • Life and AD&D, Spousal Life, Child Life Insurance Plans

  • Educational Assistance Plan

  • Identity Theft, Legal, Auto & Home and Pet Insurance

Windstream is an equal opportunity employer. At Windstream, we celebrate the authenticity and uniqueness of our people and their ideas. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, national origin, genetic information, protected veteran status, current military status, disability, sexual orientation, marital status, creed, citizenship status, or any other status protected by law, and to give full consideration to qualified disabled individuals and protected veterans.

Actual base pay for this job will depend on the candidate's primary work location and other factors, such as relevant skills and experience.

Notice to Non-U.S. Citizens: Windstream, as a holder of licenses granted by the Federal Communications Commission, is required to notify and to obtain approval from federal regulatory agencies prior to granting certain system/network access to any non-U.S. citizen personnel. Offers of employment extended to non-U.S. citizens are contingent upon receiving the requisite approval from agencies overseeing compliance. Non-U.S. citizens are required to provide Windstream with the personal identifying information required to obtain the necessary approval prior to accessing certain systems and/or Windstream’s network. If you are not a U.S. citizen, please notify your recruiter or email as soon as possible for information on Windstream’s foreign personnel disclosure and approval requirements.

Job Details

Job Family IT

Job Function Information Security

Pay Type Salary

View Now

Information Security Specialist

46262 Indianapolis, Indiana Windstream Communications

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Windstream Holdings, Inc., is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the U.S.

  • Kinetic is a premier internet solutions provider on a mission to deliver ultra-fast, reliable internet to consumers and small businesses across the U.S., helping them Internet better™.

  • Windstream Enterprise is a leading managed services provider providing strategic communications and security products to mid-size businesses and enterprise clients.

  • Windstream Wholesale provides high-capacity, high-performance networking solutions and services to other telecom carriers, data centers, content providers and enterprises.

The Windstream team provides innovative software and network solutions to connect people and empower business in a world of infinite possibilities!

___

About the Role:

The Information Security Specialist is a crucial member of the Threat Detection and Response (TDR) team, dedicated to safeguarding the Windstream environment against cyber threats. This role involves a blend of expertise in cybersecurity tactics and an analytical mindset to detect, investigate, and mitigate potential security incidents. The Specialist will act as both a subject matter expert and a mentor, fostering knowledge and skills development within the team.

What You'll Do:

  • Alert Management: Detect and respond to security alerts from both TDR and third-party tooling.

  • Incident Handling: Coordinate a well-structured response to cybersecurity incidents to minimize their impact.

  • Expertise Provision: Serve as a subject matter expert in information security within the organization.

  • Mentorship: Provide guidance and help develop training plans for junior team members.

  • Tool Optimization: Oversee the review and tuning of rules for all TDR tools.

  • SIEM Enhancement: Continuously improve the SIEM system, adjust security tools, log ingestion, and rule sets in response to the evolving threat landscape.

  • Playbook Development: Create incident response playbooks based on SOC escalation metrics.

  • Automation and Streamlining: Develop and drive agile automation solutions to enhance detection capabilities, making use of Security Orchestration, Automation, and Response (SOAR) tools.

  • Threat Modeling: Conduct threat modeling exercises to maintain robust security postures.

  • Threat Hunting: Execute threat hunts on Common Vulnerabilities and Exposures (CVEs) and Indicators of Compromise (IOCs), ensuring effective monitoring.

  • Remediation Documentation: Document remediation strategies to neutralize threats and secure the environment.

  • Technical Escalation: Act as an escalation point for Tier I & II analysts or Managed Security Service Providers (MSSP).

  • Incident Response: Manage the entire incident response process, from initial alert to recovery and post-incident analysis.

  • Log Review and Engineering: Conduct log reviews and engineer the integration of log sources with security tools.

  • Policy and Documentation Maintenance: Ensure the creation and updating of cybersecurity service standards, documentation, and processes.

  • Incident Tracking: Formally document and track incidents from detection to resolution.

  • Performance Metrics: Develop metrics for Incident Response to foster process improvements.

  • Cyber Threat Intelligence: Collect and utilize threat intelligence to bolster defenses against known attack vectors.

  • Threat Classification: Prioritize threats based on intelligence and system alerts.

  • Compliance Assistance: Aid in artifact collection for compliance with standards such as PCI-DSS and SOX.

  • Team Exercises: Engage in Red/Blue team activities and participate in tabletop exercises.

  • Shift Availability: Availability to work on a 24x7 schedule to ensure continuous security coverage.

Do You Have:

  • Comprehensive knowledge of network protocols, devices, operating systems, cloud computing, and secure architecture, including proficiency in Windows, Linux, Azure, and Oracle Cloud.

  • Proficiency with SIEM, SOAR, IDS/IPS, EDR, Mail Gateways, Proxy, PKI, SYSLOG, and other network/security components.

  • Proven experience in incident response and remediation.

  • Familiarity with NIST Publications such as SP 800-53, 800-61, 800-70, 800-37.

  • Understanding of IT Security principles, techniques, and technologies.

  • Capability to conduct host and network analysis, including packet capture analysis.

  • In-depth knowledge of the MITRE ATT&CK Framework, and understanding of OWASP, Kill Chain, and other security frameworks.

  • Strong grasp of malware analysis concepts and methodologies.

  • Ability to independently manage initiatives with minimal oversight.

  • Ownership of toolsets or processes within the security domain.

  • Expertise in managing Incidents, Service Requests, Change, and Problem management processes.

  • Experience with current cyber threats and their exploitation tactics.

  • Exceptional analytical and problem-solving skills.

  • Excellent time management and organizational skills.

  • Quick learner for new technologies and concepts.

Must Haves:

Candidates must possess or be willing to obtain within the first 12 months of employment one of the following certifications: Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP) or SANS Global Information Assurance Certification (GCIH).

Physical Tasks - Standing Occasionally: 0-33% | Walking Occasionally: 0-33% |Sitting Continuously: 67-100% | Bending: Occasionally: 0-33% | Crouching: Occasionally: 0-33% | Pushing-Pulling: Occasionally: 0-33% | Carrying: Occasional: 0-33% | Reaching Above Head: Occasionally: 0-33% | Lifting-Lowering >1-15 lbs: Occasionally: 0-33% | Repetitive Hand Action: Medium Dexterity: Continuously: 67-100% | Fine Manipulating: frequently: 34% - 66%

Audio Visual Needs - Hearing: Continuously: 67-100%| Near Vision: Continuously: 67-100% | Far Vision: Occasionally: 0-33% | Peripheral Vision: Occasionally: 0-33%

Equipment Used in Job Performance : Computer, Printer, Telephone, Basic Office Supplies, Copier

___

Our Benefits:

  • Medical, Dental, Vision Insurance Plans

  • 401K Plan

  • Health & Flexible Savings Account

  • Life and AD&D, Spousal Life, Child Life Insurance Plans

  • Educational Assistance Plan

  • Identity Theft, Legal, Auto & Home and Pet Insurance

Windstream is an equal opportunity employer. At Windstream, we celebrate the authenticity and uniqueness of our people and their ideas. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, national origin, genetic information, protected veteran status, current military status, disability, sexual orientation, marital status, creed, citizenship status, or any other status protected by law, and to give full consideration to qualified disabled individuals and protected veterans.

Actual base pay for this job will depend on the candidate's primary work location and other factors, such as relevant skills and experience.

Notice to Non-U.S. Citizens: Windstream, as a holder of licenses granted by the Federal Communications Commission, is required to notify and to obtain approval from federal regulatory agencies prior to granting certain system/network access to any non-U.S. citizen personnel. Offers of employment extended to non-U.S. citizens are contingent upon receiving the requisite approval from agencies overseeing compliance. Non-U.S. citizens are required to provide Windstream with the personal identifying information required to obtain the necessary approval prior to accessing certain systems and/or Windstream’s network. If you are not a U.S. citizen, please notify your recruiter or email as soon as possible for information on Windstream’s foreign personnel disclosure and approval requirements.

Job Details

Job Family IT

Job Function Information Security

Pay Type Salary

View Now

Information Security Specialist

48900 Lansing, Michigan Windstream Communications

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Windstream Holdings, Inc., is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the U.S.

  • Kinetic is a premier internet solutions provider on a mission to deliver ultra-fast, reliable internet to consumers and small businesses across the U.S., helping them Internet better™.

  • Windstream Enterprise is a leading managed services provider providing strategic communications and security products to mid-size businesses and enterprise clients.

  • Windstream Wholesale provides high-capacity, high-performance networking solutions and services to other telecom carriers, data centers, content providers and enterprises.

The Windstream team provides innovative software and network solutions to connect people and empower business in a world of infinite possibilities!

___

About the Role:

The Information Security Specialist is a crucial member of the Threat Detection and Response (TDR) team, dedicated to safeguarding the Windstream environment against cyber threats. This role involves a blend of expertise in cybersecurity tactics and an analytical mindset to detect, investigate, and mitigate potential security incidents. The Specialist will act as both a subject matter expert and a mentor, fostering knowledge and skills development within the team.

What You'll Do:

  • Alert Management: Detect and respond to security alerts from both TDR and third-party tooling.

  • Incident Handling: Coordinate a well-structured response to cybersecurity incidents to minimize their impact.

  • Expertise Provision: Serve as a subject matter expert in information security within the organization.

  • Mentorship: Provide guidance and help develop training plans for junior team members.

  • Tool Optimization: Oversee the review and tuning of rules for all TDR tools.

  • SIEM Enhancement: Continuously improve the SIEM system, adjust security tools, log ingestion, and rule sets in response to the evolving threat landscape.

  • Playbook Development: Create incident response playbooks based on SOC escalation metrics.

  • Automation and Streamlining: Develop and drive agile automation solutions to enhance detection capabilities, making use of Security Orchestration, Automation, and Response (SOAR) tools.

  • Threat Modeling: Conduct threat modeling exercises to maintain robust security postures.

  • Threat Hunting: Execute threat hunts on Common Vulnerabilities and Exposures (CVEs) and Indicators of Compromise (IOCs), ensuring effective monitoring.

  • Remediation Documentation: Document remediation strategies to neutralize threats and secure the environment.

  • Technical Escalation: Act as an escalation point for Tier I & II analysts or Managed Security Service Providers (MSSP).

  • Incident Response: Manage the entire incident response process, from initial alert to recovery and post-incident analysis.

  • Log Review and Engineering: Conduct log reviews and engineer the integration of log sources with security tools.

  • Policy and Documentation Maintenance: Ensure the creation and updating of cybersecurity service standards, documentation, and processes.

  • Incident Tracking: Formally document and track incidents from detection to resolution.

  • Performance Metrics: Develop metrics for Incident Response to foster process improvements.

  • Cyber Threat Intelligence: Collect and utilize threat intelligence to bolster defenses against known attack vectors.

  • Threat Classification: Prioritize threats based on intelligence and system alerts.

  • Compliance Assistance: Aid in artifact collection for compliance with standards such as PCI-DSS and SOX.

  • Team Exercises: Engage in Red/Blue team activities and participate in tabletop exercises.

  • Shift Availability: Availability to work on a 24x7 schedule to ensure continuous security coverage.

Do You Have:

  • Comprehensive knowledge of network protocols, devices, operating systems, cloud computing, and secure architecture, including proficiency in Windows, Linux, Azure, and Oracle Cloud.

  • Proficiency with SIEM, SOAR, IDS/IPS, EDR, Mail Gateways, Proxy, PKI, SYSLOG, and other network/security components.

  • Proven experience in incident response and remediation.

  • Familiarity with NIST Publications such as SP 800-53, 800-61, 800-70, 800-37.

  • Understanding of IT Security principles, techniques, and technologies.

  • Capability to conduct host and network analysis, including packet capture analysis.

  • In-depth knowledge of the MITRE ATT&CK Framework, and understanding of OWASP, Kill Chain, and other security frameworks.

  • Strong grasp of malware analysis concepts and methodologies.

  • Ability to independently manage initiatives with minimal oversight.

  • Ownership of toolsets or processes within the security domain.

  • Expertise in managing Incidents, Service Requests, Change, and Problem management processes.

  • Experience with current cyber threats and their exploitation tactics.

  • Exceptional analytical and problem-solving skills.

  • Excellent time management and organizational skills.

  • Quick learner for new technologies and concepts.

Must Haves:

Candidates must possess or be willing to obtain within the first 12 months of employment one of the following certifications: Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP) or SANS Global Information Assurance Certification (GCIH).

Physical Tasks - Standing Occasionally: 0-33% | Walking Occasionally: 0-33% |Sitting Continuously: 67-100% | Bending: Occasionally: 0-33% | Crouching: Occasionally: 0-33% | Pushing-Pulling: Occasionally: 0-33% | Carrying: Occasional: 0-33% | Reaching Above Head: Occasionally: 0-33% | Lifting-Lowering >1-15 lbs: Occasionally: 0-33% | Repetitive Hand Action: Medium Dexterity: Continuously: 67-100% | Fine Manipulating: frequently: 34% - 66%

Audio Visual Needs - Hearing: Continuously: 67-100%| Near Vision: Continuously: 67-100% | Far Vision: Occasionally: 0-33% | Peripheral Vision: Occasionally: 0-33%

Equipment Used in Job Performance : Computer, Printer, Telephone, Basic Office Supplies, Copier

___

Our Benefits:

  • Medical, Dental, Vision Insurance Plans

  • 401K Plan

  • Health & Flexible Savings Account

  • Life and AD&D, Spousal Life, Child Life Insurance Plans

  • Educational Assistance Plan

  • Identity Theft, Legal, Auto & Home and Pet Insurance

Windstream is an equal opportunity employer. At Windstream, we celebrate the authenticity and uniqueness of our people and their ideas. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, national origin, genetic information, protected veteran status, current military status, disability, sexual orientation, marital status, creed, citizenship status, or any other status protected by law, and to give full consideration to qualified disabled individuals and protected veterans.

Actual base pay for this job will depend on the candidate's primary work location and other factors, such as relevant skills and experience.

Notice to Non-U.S. Citizens: Windstream, as a holder of licenses granted by the Federal Communications Commission, is required to notify and to obtain approval from federal regulatory agencies prior to granting certain system/network access to any non-U.S. citizen personnel. Offers of employment extended to non-U.S. citizens are contingent upon receiving the requisite approval from agencies overseeing compliance. Non-U.S. citizens are required to provide Windstream with the personal identifying information required to obtain the necessary approval prior to accessing certain systems and/or Windstream’s network. If you are not a U.S. citizen, please notify your recruiter or email as soon as possible for information on Windstream’s foreign personnel disclosure and approval requirements.

Job Details

Job Family IT

Job Function Information Security

Pay Type Salary

View Now

Information Security Specialist

20022 Washington, District Of Columbia Windstream Communications

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Windstream Holdings, Inc., is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the U.S.

  • Kinetic is a premier internet solutions provider on a mission to deliver ultra-fast, reliable internet to consumers and small businesses across the U.S., helping them Internet better™.

  • Windstream Enterprise is a leading managed services provider providing strategic communications and security products to mid-size businesses and enterprise clients.

  • Windstream Wholesale provides high-capacity, high-performance networking solutions and services to other telecom carriers, data centers, content providers and enterprises.

The Windstream team provides innovative software and network solutions to connect people and empower business in a world of infinite possibilities!

___

About the Role:

The Information Security Specialist is a crucial member of the Threat Detection and Response (TDR) team, dedicated to safeguarding the Windstream environment against cyber threats. This role involves a blend of expertise in cybersecurity tactics and an analytical mindset to detect, investigate, and mitigate potential security incidents. The Specialist will act as both a subject matter expert and a mentor, fostering knowledge and skills development within the team.

What You'll Do:

  • Alert Management: Detect and respond to security alerts from both TDR and third-party tooling.

  • Incident Handling: Coordinate a well-structured response to cybersecurity incidents to minimize their impact.

  • Expertise Provision: Serve as a subject matter expert in information security within the organization.

  • Mentorship: Provide guidance and help develop training plans for junior team members.

  • Tool Optimization: Oversee the review and tuning of rules for all TDR tools.

  • SIEM Enhancement: Continuously improve the SIEM system, adjust security tools, log ingestion, and rule sets in response to the evolving threat landscape.

  • Playbook Development: Create incident response playbooks based on SOC escalation metrics.

  • Automation and Streamlining: Develop and drive agile automation solutions to enhance detection capabilities, making use of Security Orchestration, Automation, and Response (SOAR) tools.

  • Threat Modeling: Conduct threat modeling exercises to maintain robust security postures.

  • Threat Hunting: Execute threat hunts on Common Vulnerabilities and Exposures (CVEs) and Indicators of Compromise (IOCs), ensuring effective monitoring.

  • Remediation Documentation: Document remediation strategies to neutralize threats and secure the environment.

  • Technical Escalation: Act as an escalation point for Tier I & II analysts or Managed Security Service Providers (MSSP).

  • Incident Response: Manage the entire incident response process, from initial alert to recovery and post-incident analysis.

  • Log Review and Engineering: Conduct log reviews and engineer the integration of log sources with security tools.

  • Policy and Documentation Maintenance: Ensure the creation and updating of cybersecurity service standards, documentation, and processes.

  • Incident Tracking: Formally document and track incidents from detection to resolution.

  • Performance Metrics: Develop metrics for Incident Response to foster process improvements.

  • Cyber Threat Intelligence: Collect and utilize threat intelligence to bolster defenses against known attack vectors.

  • Threat Classification: Prioritize threats based on intelligence and system alerts.

  • Compliance Assistance: Aid in artifact collection for compliance with standards such as PCI-DSS and SOX.

  • Team Exercises: Engage in Red/Blue team activities and participate in tabletop exercises.

  • Shift Availability: Availability to work on a 24x7 schedule to ensure continuous security coverage.

Do You Have:

  • Comprehensive knowledge of network protocols, devices, operating systems, cloud computing, and secure architecture, including proficiency in Windows, Linux, Azure, and Oracle Cloud.

  • Proficiency with SIEM, SOAR, IDS/IPS, EDR, Mail Gateways, Proxy, PKI, SYSLOG, and other network/security components.

  • Proven experience in incident response and remediation.

  • Familiarity with NIST Publications such as SP 800-53, 800-61, 800-70, 800-37.

  • Understanding of IT Security principles, techniques, and technologies.

  • Capability to conduct host and network analysis, including packet capture analysis.

  • In-depth knowledge of the MITRE ATT&CK Framework, and understanding of OWASP, Kill Chain, and other security frameworks.

  • Strong grasp of malware analysis concepts and methodologies.

  • Ability to independently manage initiatives with minimal oversight.

  • Ownership of toolsets or processes within the security domain.

  • Expertise in managing Incidents, Service Requests, Change, and Problem management processes.

  • Experience with current cyber threats and their exploitation tactics.

  • Exceptional analytical and problem-solving skills.

  • Excellent time management and organizational skills.

  • Quick learner for new technologies and concepts.

Must Haves:

Candidates must possess or be willing to obtain within the first 12 months of employment one of the following certifications: Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP) or SANS Global Information Assurance Certification (GCIH).

Physical Tasks - Standing Occasionally: 0-33% | Walking Occasionally: 0-33% |Sitting Continuously: 67-100% | Bending: Occasionally: 0-33% | Crouching: Occasionally: 0-33% | Pushing-Pulling: Occasionally: 0-33% | Carrying: Occasional: 0-33% | Reaching Above Head: Occasionally: 0-33% | Lifting-Lowering >1-15 lbs: Occasionally: 0-33% | Repetitive Hand Action: Medium Dexterity: Continuously: 67-100% | Fine Manipulating: frequently: 34% - 66%

Audio Visual Needs - Hearing: Continuously: 67-100%| Near Vision: Continuously: 67-100% | Far Vision: Occasionally: 0-33% | Peripheral Vision: Occasionally: 0-33%

Equipment Used in Job Performance : Computer, Printer, Telephone, Basic Office Supplies, Copier

___

Our Benefits:

  • Medical, Dental, Vision Insurance Plans

  • 401K Plan

  • Health & Flexible Savings Account

  • Life and AD&D, Spousal Life, Child Life Insurance Plans

  • Educational Assistance Plan

  • Identity Theft, Legal, Auto & Home and Pet Insurance

Windstream is an equal opportunity employer. At Windstream, we celebrate the authenticity and uniqueness of our people and their ideas. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, national origin, genetic information, protected veteran status, current military status, disability, sexual orientation, marital status, creed, citizenship status, or any other status protected by law, and to give full consideration to qualified disabled individuals and protected veterans.

Actual base pay for this job will depend on the candidate's primary work location and other factors, such as relevant skills and experience.

Notice to Non-U.S. Citizens: Windstream, as a holder of licenses granted by the Federal Communications Commission, is required to notify and to obtain approval from federal regulatory agencies prior to granting certain system/network access to any non-U.S. citizen personnel. Offers of employment extended to non-U.S. citizens are contingent upon receiving the requisite approval from agencies overseeing compliance. Non-U.S. citizens are required to provide Windstream with the personal identifying information required to obtain the necessary approval prior to accessing certain systems and/or Windstream’s network. If you are not a U.S. citizen, please notify your recruiter or email as soon as possible for information on Windstream’s foreign personnel disclosure and approval requirements.

Job Details

Job Family IT

Job Function Information Security

Pay Type Salary

View Now
Be The First To Know

About the latest Security specialist Jobs in United States !

Information Security Specialist

17124 Harrisburg, Pennsylvania Windstream Communications

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Windstream Holdings, Inc., is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the U.S.

  • Kinetic is a premier internet solutions provider on a mission to deliver ultra-fast, reliable internet to consumers and small businesses across the U.S., helping them Internet better™.

  • Windstream Enterprise is a leading managed services provider providing strategic communications and security products to mid-size businesses and enterprise clients.

  • Windstream Wholesale provides high-capacity, high-performance networking solutions and services to other telecom carriers, data centers, content providers and enterprises.

The Windstream team provides innovative software and network solutions to connect people and empower business in a world of infinite possibilities!

___

About the Role:

The Information Security Specialist is a crucial member of the Threat Detection and Response (TDR) team, dedicated to safeguarding the Windstream environment against cyber threats. This role involves a blend of expertise in cybersecurity tactics and an analytical mindset to detect, investigate, and mitigate potential security incidents. The Specialist will act as both a subject matter expert and a mentor, fostering knowledge and skills development within the team.

What You'll Do:

  • Alert Management: Detect and respond to security alerts from both TDR and third-party tooling.

  • Incident Handling: Coordinate a well-structured response to cybersecurity incidents to minimize their impact.

  • Expertise Provision: Serve as a subject matter expert in information security within the organization.

  • Mentorship: Provide guidance and help develop training plans for junior team members.

  • Tool Optimization: Oversee the review and tuning of rules for all TDR tools.

  • SIEM Enhancement: Continuously improve the SIEM system, adjust security tools, log ingestion, and rule sets in response to the evolving threat landscape.

  • Playbook Development: Create incident response playbooks based on SOC escalation metrics.

  • Automation and Streamlining: Develop and drive agile automation solutions to enhance detection capabilities, making use of Security Orchestration, Automation, and Response (SOAR) tools.

  • Threat Modeling: Conduct threat modeling exercises to maintain robust security postures.

  • Threat Hunting: Execute threat hunts on Common Vulnerabilities and Exposures (CVEs) and Indicators of Compromise (IOCs), ensuring effective monitoring.

  • Remediation Documentation: Document remediation strategies to neutralize threats and secure the environment.

  • Technical Escalation: Act as an escalation point for Tier I & II analysts or Managed Security Service Providers (MSSP).

  • Incident Response: Manage the entire incident response process, from initial alert to recovery and post-incident analysis.

  • Log Review and Engineering: Conduct log reviews and engineer the integration of log sources with security tools.

  • Policy and Documentation Maintenance: Ensure the creation and updating of cybersecurity service standards, documentation, and processes.

  • Incident Tracking: Formally document and track incidents from detection to resolution.

  • Performance Metrics: Develop metrics for Incident Response to foster process improvements.

  • Cyber Threat Intelligence: Collect and utilize threat intelligence to bolster defenses against known attack vectors.

  • Threat Classification: Prioritize threats based on intelligence and system alerts.

  • Compliance Assistance: Aid in artifact collection for compliance with standards such as PCI-DSS and SOX.

  • Team Exercises: Engage in Red/Blue team activities and participate in tabletop exercises.

  • Shift Availability: Availability to work on a 24x7 schedule to ensure continuous security coverage.

Do You Have:

  • Comprehensive knowledge of network protocols, devices, operating systems, cloud computing, and secure architecture, including proficiency in Windows, Linux, Azure, and Oracle Cloud.

  • Proficiency with SIEM, SOAR, IDS/IPS, EDR, Mail Gateways, Proxy, PKI, SYSLOG, and other network/security components.

  • Proven experience in incident response and remediation.

  • Familiarity with NIST Publications such as SP 800-53, 800-61, 800-70, 800-37.

  • Understanding of IT Security principles, techniques, and technologies.

  • Capability to conduct host and network analysis, including packet capture analysis.

  • In-depth knowledge of the MITRE ATT&CK Framework, and understanding of OWASP, Kill Chain, and other security frameworks.

  • Strong grasp of malware analysis concepts and methodologies.

  • Ability to independently manage initiatives with minimal oversight.

  • Ownership of toolsets or processes within the security domain.

  • Expertise in managing Incidents, Service Requests, Change, and Problem management processes.

  • Experience with current cyber threats and their exploitation tactics.

  • Exceptional analytical and problem-solving skills.

  • Excellent time management and organizational skills.

  • Quick learner for new technologies and concepts.

Must Haves:

Candidates must possess or be willing to obtain within the first 12 months of employment one of the following certifications: Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP) or SANS Global Information Assurance Certification (GCIH).

Physical Tasks - Standing Occasionally: 0-33% | Walking Occasionally: 0-33% |Sitting Continuously: 67-100% | Bending: Occasionally: 0-33% | Crouching: Occasionally: 0-33% | Pushing-Pulling: Occasionally: 0-33% | Carrying: Occasional: 0-33% | Reaching Above Head: Occasionally: 0-33% | Lifting-Lowering >1-15 lbs: Occasionally: 0-33% | Repetitive Hand Action: Medium Dexterity: Continuously: 67-100% | Fine Manipulating: frequently: 34% - 66%

Audio Visual Needs - Hearing: Continuously: 67-100%| Near Vision: Continuously: 67-100% | Far Vision: Occasionally: 0-33% | Peripheral Vision: Occasionally: 0-33%

Equipment Used in Job Performance : Computer, Printer, Telephone, Basic Office Supplies, Copier

___

Our Benefits:

  • Medical, Dental, Vision Insurance Plans

  • 401K Plan

  • Health & Flexible Savings Account

  • Life and AD&D, Spousal Life, Child Life Insurance Plans

  • Educational Assistance Plan

  • Identity Theft, Legal, Auto & Home and Pet Insurance

Windstream is an equal opportunity employer. At Windstream, we celebrate the authenticity and uniqueness of our people and their ideas. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, national origin, genetic information, protected veteran status, current military status, disability, sexual orientation, marital status, creed, citizenship status, or any other status protected by law, and to give full consideration to qualified disabled individuals and protected veterans.

Actual base pay for this job will depend on the candidate's primary work location and other factors, such as relevant skills and experience.

Notice to Non-U.S. Citizens: Windstream, as a holder of licenses granted by the Federal Communications Commission, is required to notify and to obtain approval from federal regulatory agencies prior to granting certain system/network access to any non-U.S. citizen personnel. Offers of employment extended to non-U.S. citizens are contingent upon receiving the requisite approval from agencies overseeing compliance. Non-U.S. citizens are required to provide Windstream with the personal identifying information required to obtain the necessary approval prior to accessing certain systems and/or Windstream’s network. If you are not a U.S. citizen, please notify your recruiter or email as soon as possible for information on Windstream’s foreign personnel disclosure and approval requirements.

Job Details

Job Family IT

Job Function Information Security

Pay Type Salary

View Now

Information Security Specialist

21403 Annapolis, Maryland Windstream Communications

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Windstream Holdings, Inc., is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the U.S.

  • Kinetic is a premier internet solutions provider on a mission to deliver ultra-fast, reliable internet to consumers and small businesses across the U.S., helping them Internet better™.

  • Windstream Enterprise is a leading managed services provider providing strategic communications and security products to mid-size businesses and enterprise clients.

  • Windstream Wholesale provides high-capacity, high-performance networking solutions and services to other telecom carriers, data centers, content providers and enterprises.

The Windstream team provides innovative software and network solutions to connect people and empower business in a world of infinite possibilities!

___

About the Role:

The Information Security Specialist is a crucial member of the Threat Detection and Response (TDR) team, dedicated to safeguarding the Windstream environment against cyber threats. This role involves a blend of expertise in cybersecurity tactics and an analytical mindset to detect, investigate, and mitigate potential security incidents. The Specialist will act as both a subject matter expert and a mentor, fostering knowledge and skills development within the team.

What You'll Do:

  • Alert Management: Detect and respond to security alerts from both TDR and third-party tooling.

  • Incident Handling: Coordinate a well-structured response to cybersecurity incidents to minimize their impact.

  • Expertise Provision: Serve as a subject matter expert in information security within the organization.

  • Mentorship: Provide guidance and help develop training plans for junior team members.

  • Tool Optimization: Oversee the review and tuning of rules for all TDR tools.

  • SIEM Enhancement: Continuously improve the SIEM system, adjust security tools, log ingestion, and rule sets in response to the evolving threat landscape.

  • Playbook Development: Create incident response playbooks based on SOC escalation metrics.

  • Automation and Streamlining: Develop and drive agile automation solutions to enhance detection capabilities, making use of Security Orchestration, Automation, and Response (SOAR) tools.

  • Threat Modeling: Conduct threat modeling exercises to maintain robust security postures.

  • Threat Hunting: Execute threat hunts on Common Vulnerabilities and Exposures (CVEs) and Indicators of Compromise (IOCs), ensuring effective monitoring.

  • Remediation Documentation: Document remediation strategies to neutralize threats and secure the environment.

  • Technical Escalation: Act as an escalation point for Tier I & II analysts or Managed Security Service Providers (MSSP).

  • Incident Response: Manage the entire incident response process, from initial alert to recovery and post-incident analysis.

  • Log Review and Engineering: Conduct log reviews and engineer the integration of log sources with security tools.

  • Policy and Documentation Maintenance: Ensure the creation and updating of cybersecurity service standards, documentation, and processes.

  • Incident Tracking: Formally document and track incidents from detection to resolution.

  • Performance Metrics: Develop metrics for Incident Response to foster process improvements.

  • Cyber Threat Intelligence: Collect and utilize threat intelligence to bolster defenses against known attack vectors.

  • Threat Classification: Prioritize threats based on intelligence and system alerts.

  • Compliance Assistance: Aid in artifact collection for compliance with standards such as PCI-DSS and SOX.

  • Team Exercises: Engage in Red/Blue team activities and participate in tabletop exercises.

  • Shift Availability: Availability to work on a 24x7 schedule to ensure continuous security coverage.

Do You Have:

  • Comprehensive knowledge of network protocols, devices, operating systems, cloud computing, and secure architecture, including proficiency in Windows, Linux, Azure, and Oracle Cloud.

  • Proficiency with SIEM, SOAR, IDS/IPS, EDR, Mail Gateways, Proxy, PKI, SYSLOG, and other network/security components.

  • Proven experience in incident response and remediation.

  • Familiarity with NIST Publications such as SP 800-53, 800-61, 800-70, 800-37.

  • Understanding of IT Security principles, techniques, and technologies.

  • Capability to conduct host and network analysis, including packet capture analysis.

  • In-depth knowledge of the MITRE ATT&CK Framework, and understanding of OWASP, Kill Chain, and other security frameworks.

  • Strong grasp of malware analysis concepts and methodologies.

  • Ability to independently manage initiatives with minimal oversight.

  • Ownership of toolsets or processes within the security domain.

  • Expertise in managing Incidents, Service Requests, Change, and Problem management processes.

  • Experience with current cyber threats and their exploitation tactics.

  • Exceptional analytical and problem-solving skills.

  • Excellent time management and organizational skills.

  • Quick learner for new technologies and concepts.

Must Haves:

Candidates must possess or be willing to obtain within the first 12 months of employment one of the following certifications: Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP) or SANS Global Information Assurance Certification (GCIH).

Physical Tasks - Standing Occasionally: 0-33% | Walking Occasionally: 0-33% |Sitting Continuously: 67-100% | Bending: Occasionally: 0-33% | Crouching: Occasionally: 0-33% | Pushing-Pulling: Occasionally: 0-33% | Carrying: Occasional: 0-33% | Reaching Above Head: Occasionally: 0-33% | Lifting-Lowering >1-15 lbs: Occasionally: 0-33% | Repetitive Hand Action: Medium Dexterity: Continuously: 67-100% | Fine Manipulating: frequently: 34% - 66%

Audio Visual Needs - Hearing: Continuously: 67-100%| Near Vision: Continuously: 67-100% | Far Vision: Occasionally: 0-33% | Peripheral Vision: Occasionally: 0-33%

Equipment Used in Job Performance : Computer, Printer, Telephone, Basic Office Supplies, Copier

___

Our Benefits:

  • Medical, Dental, Vision Insurance Plans

  • 401K Plan

  • Health & Flexible Savings Account

  • Life and AD&D, Spousal Life, Child Life Insurance Plans

  • Educational Assistance Plan

  • Identity Theft, Legal, Auto & Home and Pet Insurance

Windstream is an equal opportunity employer. At Windstream, we celebrate the authenticity and uniqueness of our people and their ideas. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, national origin, genetic information, protected veteran status, current military status, disability, sexual orientation, marital status, creed, citizenship status, or any other status protected by law, and to give full consideration to qualified disabled individuals and protected veterans.

Actual base pay for this job will depend on the candidate's primary work location and other factors, such as relevant skills and experience.

Notice to Non-U.S. Citizens: Windstream, as a holder of licenses granted by the Federal Communications Commission, is required to notify and to obtain approval from federal regulatory agencies prior to granting certain system/network access to any non-U.S. citizen personnel. Offers of employment extended to non-U.S. citizens are contingent upon receiving the requisite approval from agencies overseeing compliance. Non-U.S. citizens are required to provide Windstream with the personal identifying information required to obtain the necessary approval prior to accessing certain systems and/or Windstream’s network. If you are not a U.S. citizen, please notify your recruiter or email as soon as possible for information on Windstream’s foreign personnel disclosure and approval requirements.

Job Details

Job Family IT

Job Function Information Security

Pay Type Salary

View Now

Information Security Specialist

02298 Boston, Massachusetts Windstream Communications

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Windstream Holdings, Inc., is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the U.S.

  • Kinetic is a premier internet solutions provider on a mission to deliver ultra-fast, reliable internet to consumers and small businesses across the U.S., helping them Internet better™.

  • Windstream Enterprise is a leading managed services provider providing strategic communications and security products to mid-size businesses and enterprise clients.

  • Windstream Wholesale provides high-capacity, high-performance networking solutions and services to other telecom carriers, data centers, content providers and enterprises.

The Windstream team provides innovative software and network solutions to connect people and empower business in a world of infinite possibilities!

___

About the Role:

The Information Security Specialist is a crucial member of the Threat Detection and Response (TDR) team, dedicated to safeguarding the Windstream environment against cyber threats. This role involves a blend of expertise in cybersecurity tactics and an analytical mindset to detect, investigate, and mitigate potential security incidents. The Specialist will act as both a subject matter expert and a mentor, fostering knowledge and skills development within the team.

What You'll Do:

  • Alert Management: Detect and respond to security alerts from both TDR and third-party tooling.

  • Incident Handling: Coordinate a well-structured response to cybersecurity incidents to minimize their impact.

  • Expertise Provision: Serve as a subject matter expert in information security within the organization.

  • Mentorship: Provide guidance and help develop training plans for junior team members.

  • Tool Optimization: Oversee the review and tuning of rules for all TDR tools.

  • SIEM Enhancement: Continuously improve the SIEM system, adjust security tools, log ingestion, and rule sets in response to the evolving threat landscape.

  • Playbook Development: Create incident response playbooks based on SOC escalation metrics.

  • Automation and Streamlining: Develop and drive agile automation solutions to enhance detection capabilities, making use of Security Orchestration, Automation, and Response (SOAR) tools.

  • Threat Modeling: Conduct threat modeling exercises to maintain robust security postures.

  • Threat Hunting: Execute threat hunts on Common Vulnerabilities and Exposures (CVEs) and Indicators of Compromise (IOCs), ensuring effective monitoring.

  • Remediation Documentation: Document remediation strategies to neutralize threats and secure the environment.

  • Technical Escalation: Act as an escalation point for Tier I & II analysts or Managed Security Service Providers (MSSP).

  • Incident Response: Manage the entire incident response process, from initial alert to recovery and post-incident analysis.

  • Log Review and Engineering: Conduct log reviews and engineer the integration of log sources with security tools.

  • Policy and Documentation Maintenance: Ensure the creation and updating of cybersecurity service standards, documentation, and processes.

  • Incident Tracking: Formally document and track incidents from detection to resolution.

  • Performance Metrics: Develop metrics for Incident Response to foster process improvements.

  • Cyber Threat Intelligence: Collect and utilize threat intelligence to bolster defenses against known attack vectors.

  • Threat Classification: Prioritize threats based on intelligence and system alerts.

  • Compliance Assistance: Aid in artifact collection for compliance with standards such as PCI-DSS and SOX.

  • Team Exercises: Engage in Red/Blue team activities and participate in tabletop exercises.

  • Shift Availability: Availability to work on a 24x7 schedule to ensure continuous security coverage.

Do You Have:

  • Comprehensive knowledge of network protocols, devices, operating systems, cloud computing, and secure architecture, including proficiency in Windows, Linux, Azure, and Oracle Cloud.

  • Proficiency with SIEM, SOAR, IDS/IPS, EDR, Mail Gateways, Proxy, PKI, SYSLOG, and other network/security components.

  • Proven experience in incident response and remediation.

  • Familiarity with NIST Publications such as SP 800-53, 800-61, 800-70, 800-37.

  • Understanding of IT Security principles, techniques, and technologies.

  • Capability to conduct host and network analysis, including packet capture analysis.

  • In-depth knowledge of the MITRE ATT&CK Framework, and understanding of OWASP, Kill Chain, and other security frameworks.

  • Strong grasp of malware analysis concepts and methodologies.

  • Ability to independently manage initiatives with minimal oversight.

  • Ownership of toolsets or processes within the security domain.

  • Expertise in managing Incidents, Service Requests, Change, and Problem management processes.

  • Experience with current cyber threats and their exploitation tactics.

  • Exceptional analytical and problem-solving skills.

  • Excellent time management and organizational skills.

  • Quick learner for new technologies and concepts.

Must Haves:

Candidates must possess or be willing to obtain within the first 12 months of employment one of the following certifications: Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP) or SANS Global Information Assurance Certification (GCIH).

Physical Tasks - Standing Occasionally: 0-33% | Walking Occasionally: 0-33% |Sitting Continuously: 67-100% | Bending: Occasionally: 0-33% | Crouching: Occasionally: 0-33% | Pushing-Pulling: Occasionally: 0-33% | Carrying: Occasional: 0-33% | Reaching Above Head: Occasionally: 0-33% | Lifting-Lowering >1-15 lbs: Occasionally: 0-33% | Repetitive Hand Action: Medium Dexterity: Continuously: 67-100% | Fine Manipulating: frequently: 34% - 66%

Audio Visual Needs - Hearing: Continuously: 67-100%| Near Vision: Continuously: 67-100% | Far Vision: Occasionally: 0-33% | Peripheral Vision: Occasionally: 0-33%

Equipment Used in Job Performance : Computer, Printer, Telephone, Basic Office Supplies, Copier

___

Our Benefits:

  • Medical, Dental, Vision Insurance Plans

  • 401K Plan

  • Health & Flexible Savings Account

  • Life and AD&D, Spousal Life, Child Life Insurance Plans

  • Educational Assistance Plan

  • Identity Theft, Legal, Auto & Home and Pet Insurance

Windstream is an equal opportunity employer. At Windstream, we celebrate the authenticity and uniqueness of our people and their ideas. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, national origin, genetic information, protected veteran status, current military status, disability, sexual orientation, marital status, creed, citizenship status, or any other status protected by law, and to give full consideration to qualified disabled individuals and protected veterans.

Actual base pay for this job will depend on the candidate's primary work location and other factors, such as relevant skills and experience.

Notice to Non-U.S. Citizens: Windstream, as a holder of licenses granted by the Federal Communications Commission, is required to notify and to obtain approval from federal regulatory agencies prior to granting certain system/network access to any non-U.S. citizen personnel. Offers of employment extended to non-U.S. citizens are contingent upon receiving the requisite approval from agencies overseeing compliance. Non-U.S. citizens are required to provide Windstream with the personal identifying information required to obtain the necessary approval prior to accessing certain systems and/or Windstream’s network. If you are not a U.S. citizen, please notify your recruiter or email as soon as possible for information on Windstream’s foreign personnel disclosure and approval requirements.

Job Details

Job Family IT

Job Function Information Security

Pay Type Salary

View Now
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Specialist Jobs