Ranked as #12 on Forbes’ List of 25 Fastest Growing Public Tech Companies for 2017, EPAM is committed to providing our global team of over 24,000 people with inspiring careers from day one. EPAMers lead with passion and honesty, and think creatively. Our people are the source of our success and we value collaboration, try to always understand our customers’ business, and strive for the highest standards of excellence. No matter where you are located, you’ll join a dedicated, diverse community that will help you discover your fullest potential.
You are curious, persistent, logical and clever – a true techie at heart. You enjoy living by the code of your craft and developing elegant solutions for complex problems. If this sounds like you, this could be the perfect opportunity to join EPAM as a Security Engineer. Scroll down to learn more about the position’s responsibilities and requirements.
EPAM is looking for an experienced IT Security Engineer with good communication skills to join our global team of IT professionals. The IT Security Engineer will be a part of the Information Security Team and will be responsible for assessing, designing, resolving and integrating security technology solutions. This position will increase power security to the new level.
Detect and resolve security issues across whole assets of the company including databases, web applications, network devices, server, workstations, etc;
Collaborate with enterprise architects, other functional area architects and security specialists to ensure adequate security solutions are in place throughout all IT systems and platforms to mitigate identified risks sufficiently, and to meet business objectives and regulatory requirements;
Respond to critical computer security incidents by collecting, analyzing and preserving digital evidence; answer user questions related to security technology and advice on the security impact of technical changes;
Serve as a security expert in application development, database design, network and/or platform (operating system) efforts, helping project teams comply with information security policies, industry regulations, and best practices;
Research, design and advocate new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners and vendors;
Evaluate and develop secure solutions, based on approved security architectures. Analyze business impact and exposure, based on emerging security threats, vulnerabilities and risks;
Partner in the design of a security architecture review board and process and monitor adherence to security policies, standards, and procedures where security architecture is involved;
Develop and write standard documents as they pertain to architecture or security technology solutions;
Collaborate with various resources both inside information security as well as in other IT departments to establish a good understanding of capabilities, business needs, and areas for improvement;
Ability to identify and recommend mitigations for vulnerabilities and exploits;
Provide regular reporting on the status of the information security efforts;
Perform additional duties as assigned by management.
Linux Administration experience;
Expert knowledge of security issues, techniques and implications across existing computer platforms (Windows, UNIX, MacOS) required;
In-depth knowledge of multiple, highly complex technical areas and business segments required. Experience in SIEM (QRadar), DLP systems (Symantec, Office 365) (building process and implementation systems from the ground up);
Experience in Advanced threat protection (Cisco AMP, Symantec ATP), Antivirus systems (Symantec EP) (building process and implementation systems from the ground up);
Experience in web application scanners (Acunetix) and continuous vulnerability management solutions (Nessus, Qualys);
Strong conceptual thinking skills — the ability to conceptualize complex business and technical requirements into comprehensible models and templates;
Team-oriented interpersonal skills, with the ability to interface effectively with a broad range of individuals and roles, including IT and vendors;
Strong written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate security and risk-related concepts to technical audiences;
Strong time management skills as well as strong organizational, problem solving, and analytical skills required;
Able to work in a very fast-paced environment and remain positive;
High level of personal integrity, as well as the ability to professionally handle confidential matters, and show an appropriate level of judgment;
High degree of initiative, dependable and able to work well with limited supervision;
Ability to work both independently and as part of a team.
Nice to have
Experience in MDM, EMM tools (MobileIron);
Experience in endpoint encryption solutions (MBAM, Symantec, Check Point);
Experience in a cloud-based hosting system like AWS, Azure, Google.
Career plan and real growth opportunities;
International Mobility Plan within 25 countries;
Constant training, mentoring, online corporate courses, eLearning and more;
English classes with certified teacher;
Support for employee’s initiatives (Algorithms club, toastmasters, agile club and more);
Enjoyable working environment (Gaming room, napping area, amenities, events, sport teams and more);
Flexible work schedule and dress code;
Collaborate in a multicultural environment and share best practices from around the globe;
Hired directly by EPAM & 100% under payroll;
Law benefits (IMSS, INFONAVIT, 15 days December bonus, 25% vacation bonus);
Personal insurance: Life, Major medical expenses with dental & visual coverage;
13 % employee savings fund;
Grocery coupons (added to the monthly benefits once the probation period has been passed);
10 vacations days plus 2 floating days;
Official Mexican holidays, plus two extra holidays (December 24th & 31st);
Relocation bonus: transportation, 2 weeks of accommodation for you and your family and more.
Bei EPAM setzen wir Cookies und ähnliche Technologien ein, um die Inhalte unserer Webseite auf Ihre Bedürfnisse abzustimmen und Ihnen einen optimierten Besuch zu ermöglichen. Wenn Sie unsere Webseite weiter nutzen, ohne Ihre Cookie-Einstellungen zu ändern, stimmen Sie der Verwendung von Cookies zu.