At Popular, we are committed to developing and providing growth opportunities for our employees. To promote this development, we offer internal mobility options within our organization. We invite you to take look at this opportunity:
Security Engineer
Ind. Contributor,07
Applying for a position within the same job level as your current position may also represent a growth and development opportunity.Carefully review the tasks and responsibilities in the job description prior ing.
Full Time Opportunity
General Description
The Threat Intelligence Cyber Security Engineer will work closely with in:house software development teams, Information Technology teams, and other business units, along with vendors/third:party organizations to ensure that Security testing and Threat modeling assessments are included in the workflow and performed as required per documented Standards. In addition, this role will work with the internal Threat Intel unit and other Cyber Security units to define project plans, implement, and operationalize Red team activities with in:house staff, and improve the current Threat Intelligence Program. This role will be expected to maintain industry and cyber knowledge to optimize and align Popular's Security testing and Threat Intelligence processes and systems.
Essential Duties and Responsibilities
:
Develop, implement, and operationalize the ability to run penetration testing activities with internal tools and internal staff.
:
Perform penetration testing to identify and address vulnerabilities in systems, networks, and applications.
:
Participate the oversight of external security testing vendors to perform penetration testing that is not performed in:house.
:
Analyze to improve the current Threat Modeling process, implementing identified gaps.
:
Collaborate with cross:functional teams to integrate threat modeling into development processes.
:
Conduct threat modeling exercises to identify potential vulnerabilities and weaknesses.
:
Proactively search for signs of malicious activities within the organizations network and systems.
:
Develop and implement processes to effectively operationalize threat intelligence duties.
:
Integrate threat intelligence into security operations for real:time response.
:
Streamline incident response procedures based on threat intelligence insights.
:
Analyze threat intelligence feeds and incorporate findings into security strategies.
:
Manage and respond to security requests reported through ticketing systems.
Education
Bachelors Degree in Computer Science or related fields
Experience
Three (3) years of relevant experience in threat intelligence, penetration testing, threat modeling.
Certifications and Licenses
Certifications are highly desirable but not required.
:
Security+
:
CompTIA CySA+
:
CompTIA PenTest+
:
CEH
:
CTIA
:
CISM
:
CISSP
:
CCSP
Knowledge, Skills and Abilities
:
Strong business acumen: ability to understand the needs and concerns of business stakeholders and colleagues and respond promptly and effectively to stakeholder requests. Ability to conduct analysis on work procedures,business results and recommends changes to improve the effectiveness of the businesss management.
:
Strong technical acumen: knowledge of Information Security and Information Technology concepts. Ability to write technical instructions using programs and technology. Robust knowledge of applicable local and federal laws, regulations, and guidelines.
:
Communication skills: effectively interact with internal and external stakeholders. Ability to foster trusting relationships with colleagues and clients. Highly develop written and verbal communications skills, strong abilityto communicate ideas (storytelling). Presents numerical data effectively. Superior communication andinterpersonal skills. Excellent report:writing and presentation skills. Polished in prepari