Information Security Engineer
Role details
Job location
Tech stack
Job description
The Keysight Information Security and Compliance team rises daily to the challenges of meeting the cyber security needs of a global, advanced technology company. The team delivers security solutions and services across a range of technology domains.
The cyber security team is looking for an individual with a passion for applying their experience and skills to secure Keysight's use of modern computing infrastructure and platforms. The role requires the ability to analytically assess technology needs of multiple teams, propose solutions to requirements, and help drive execution.
Candidates should have a strong interest in cyber security, and 3+ years of practical experience with a variety of tools for securing different computing environments. An analytical approach to problems using data and critical thinking will be essential.
A successful candidate will be a member of the Information Security and Compliance team and will have a key role in the development of enterprise security solutions, from whiteboard conception and design to testing, deployment, and overseeing the handoff to operations. Collaboration on projects with the rest of the security team and engagement with engineers from other departments will be frequent.
Requirements
The ideal candidate will possess at least 3 of the Required Qualifications:
- BS or MS in Computer Science or Information Security or equivalent
- 3+ years in Information Security Engineering roles
- Ability to understand and explain technical details
- Excellent communication skills, on both technical and non-technical issues
- Ability to independently handle multiple tasks, prioritize and meet deadlines
The best candidate will also have 3 or more of the Preferred Qualifications:
- Experience with various information security applications and tools
- Experience with networking architectures and protocols
- Experience with IAM technologies
- Experience with certificate management
- Experience with cloud security operations
- Experience with Linux/Windows/MacOS
- Experience with Automation
- Experience with Artificial Intelligence
- Experience with log collection architectures
- Experience developing security engineering standards and guides
- Experience creating technical diagrams to define system integrations and architecture
- Experience developing automation to integrate security tools and improve user efficiency
- Experience with scripting and data languages (Python, Bash, JSON, etc)
- Understanding of common data and network protocols (HTTP, TLS, DNS, SSH, etc)
- Experience evaluating commercial and open source network security tools and services
- Understanding of public keys, certificates, and authentication concepts