Logo for Signature Analytics

Senior - Security Engineer, Information Security (51372)

Roles & Responsibilities

  • 5+ years of experience in information security or security engineering
  • Hands-on experience with EDR, SIEM, DLP, and email security technologies
  • Strong incident response, digital forensics, threat hunting, and security operations skills
  • Experience leading vulnerability management programs, risk assessments, and cross-functional collaboration

Requirements:

  • Deploy and manage EDR across endpoints, configure detection rules and automated responses, conduct threat hunting, and optimize agent coverage and performance
  • Administer SIEM platform including log source onboarding, parsing, correlation rules, monitoring of alerts, and development of dashboards and executive reports; integrate threat intelligence feeds
  • Lead incident response activities including escalation, digital forensics, cross-functional coordination, incident documentation, and development of playbooks
  • Oversee vulnerability and threat management program with continuous scanning, remediation prioritization, risk assessment, and integration of findings with SIEM/EDR

Job description

Citrin Cooperman offers a dynamic work environment, fostering professional growth and collaboration. We’re continuously seeking talented individuals who bring a problem-solving mindset, fresh perspectives, and sharp technical expertise. We know you have choices, so our team of collaborative, innovative professionals are ready to support your professional development. At Citrin Cooperman, we offer competitive compensation and benefits and most importantly, the flexibility to manage your personal and professional life to focus on what matters most to you!

We are seeking a Senior – Security Engineer, Information Security, to join our Information Security team within the Information Technology department. They’re responsible for protecting our organization's digital assets through the deployment, management, and optimization of security technologies, including but not limited Endpoint Detection and Response (EDR), Security Information and Event Management (SIEM), Data Loss Prevention (DLP) and email security. The ideal candidate will manage vulnerability and threat programs, lead incident response efforts, and have strong technical skills in threat detection and security operations.

Responsibilities are, but not limited to

Enterprise Detection and Response

  • Deploy and manage EDR solutions across enterprise endpoints including workstations, servers, and mobile devices.
  • Configure detection rules and automated response actions to identify malware, suspicious behaviors, and advanced persistent threats.
  • Conduct proactive threat hunting to identify compromised systems and hidden threats.
  • Maintain agent deployment coverage and optimize EDR performance across all critical assets.

Security Information and Event Management (SIEM)

  • Administer SIEM platform including log source onboarding, parsing, and correlation rule development.
  • Design use cases and correlation rules to detect security incidents and policy violations.
  • Monitor and triage security alerts to determine severity, scope, and impact.
  • Create dashboards and reports for security metrics, compliance, and executive visibility.
  • Integrate threat intelligence feeds to enhance detection capabilities.

Incident Response

  • Serve as escalation point for security incidents following established procedures.
  • Perform digital forensics and investigation including log analysis, memory analysis, and disk forensics.
  • Coordinate incident response across IT, legal, HR, and executive stakeholders.
  • Document incidents thoroughly include timelines, indicators of compromise, and remediation actions.
  • Develop and maintain incident response playbooks for common attack scenarios.
  • Participate in tabletop exercises and conduct post-incident reviews to improve security posture.

Threat and Vulnerability Management

  • Establish and maintain a continuous vulnerability management program.
  • Deploy and manage vulnerability scanning tools across network, systems, applications, and cloud infrastructure.
  • Analyze vulnerability scan results and prioritize remediation based on risk, exploitability, and business impact.
  • Work with system owners and IT teams to develop remediation plans and track vulnerabiity closure.
  • Monitor threat intelligence sources for emerging threats, exploit activity, and vulnerabilities affecting the organization.
  • Conduct risk assessments for newly discovered vulnerabilities and provide guidance on compensating controls.
  • Generate vulnerability metrics and reports for management and compliance purposes
  • Integrate vulnerability data with SIEM and EDR for enhanced threat correlation
  • Perform penetration testing coordination and validate remediation effectiveness
  • Maintain vulnerability management policies, procedures, and SLAs

Security Operations and Collaboration

  • Participate in 24/7/365 security operations center (SOC) rotation (if applicable) or on-call rotation.
  • Collaborate with IT operations, development, and business teams on security initiatives.
  • Mentor junior security analysts and share knowledge across the security team.
  • Stay current with emerging threats, attack techniques, and security technologies.
  • Contribute to security awareness training programs by providing real-world incident examples.

Email Security

  • Manage email security gateway solutions to detect and block malicious emails, phishing attempts, and spam.
  • Investigate and respond to reported phishing emails and business email compromise (BEC) attempts.
  • Analyze email-based threats and implement rules to block malicious senders, domains, and attachment types.
  • Monitor email security metrics and trends to identify emerging attack patterns.
  • Work with human security awareness team to shape awareness campaigns and phishing simulations to improve user vigilance.

Data Loss Prevention (DLP)

  • Implement and manage DLP solutions across email, endpoints, network, and cloud applications.
  • Create and tune DLP policies to prevent unauthorized data exfiltration while minimizing false positives.
  • Monitor DLP alerts and investigate potential data leakage incidents.
  • Classify sensitive data and configure appropriate protection controls based on data classification.
  • Collaborate with business units to understand data flows and implement appropriate DLP controls.
  • Generate DLP metrics and reports for compliance and risk management purposes.

Network Security Engineer Related jobs

Other jobs at Signature Analytics

We help you get seen. Not ignored.

We help you get seen faster β€” by the right people.

πŸš€

Auto-Apply

We apply for you β€” automatically and instantly.

Save time, skip forms, and stay on top of every opportunity. Because you can't get seen if you're not in the race.

✨

AI Match Feedback

Know your real match before you apply.

Get a detailed AI assessment of your profile against each job posting. Because getting seen starts with passing the filters.

Upgrade to Premium. Apply smarter and get noticed.

Upgrade to Premium

Join thousands of professionals who got noticed and hired faster.