Senior Information Security Engineer (Remote)
  • Ukraine
  • ABBYY
1 year before
31.01.2024
Protect and Defend
Cyber Defense Infrastructure Support
Job Description

ABBYY powers intelligent automation. We reimagine the way people work and how companies accelerate business by delivering the intelligence that fuels automation platforms. Our solutions transform enterprise data and empower you with the insights you need to work smarter and faster. We help more than 5,000 companies globally, including many of the Fortune 500, to drive significant impact where it matters most: customer experience, profitability, and competitive advantage.


We bring together top experts from all over the world to form our growing team of 1,300+ employees based in 15 countries with headquarters in the United States. Joining ABBYY’s Sales team means being part of a professional community who enables your success. Our flat hierarchy allows employees across the world and functions to make a direct impact on our business strategy, while people programs like health and fitness challenges, Volunteer Time Off policy, internal lectures, and social events foster teamwork and work-life balance.


We invite you to join our team. Reimagine your future with boundless opportunities and a team who champions your success and expand your knowledge with every customer interaction while working flexible hours!

Your responsibilities:

Architect, design, implement, maintain and operate information system security controls and countermeasures.
Respond to information system security incidents, including investigation of, countermeasures to, and recovery from computer-based attacks, unauthorized access, and policy breaches; interact and coordinate with third-party incident responders.
Analyze trends, news and changes in threat environment, develop and execute plans for mitigation of risk.
Manage and oversight patch management and vulnerability management processes, enterprise-grade anti-virus protection.
Administrate security related infrastructure, including Microsoft and Linux Oss
Manage Active Directory group policies.
Manage log management system.
Security management in cloud infrastructures (Azure, Intune)
Participate in development/review of information security documentation (policies, procedures, guidelines etc)
Automate security controls.
Participate in firewalls, proxy servers and UTM class solutions (Sophos, Fortinet, Cisco) management.
Participate in access control process

Expectation:

Basic understanding of security frameworks and standards
Hands-on experience with incident response, developing playbooks, investigations
Practical experience with centralized enterprise anti-virus systems
Hands-on experience with WSUS, vulnerability detection solutions like Tenable and Qualys
Hands-on experience with Windows 10 and Server, Linux at the level of basic system setup and software installation
Hands-on experience with ELK and Splunk
Hands-on experience with Azure/AWS and Intune
Good understanding of Active Directory and Group Policies
Understanding of the principles of TCP/IP, DHCP, DNS, VLAN, VPN, network security, basic experience with network equipment
Practical experience in writing scripts to automate work (powershell, python, etc.), using API
Strong ethics and understanding of ethics in business and information security
Strong time management, project management and organizational skills to manage multiple tasks and changing priorities, attention to details
Good communication skills

Advantages:

• Basic hands-on experience with Cisco/Fortinet/Checkpoint firewalls

• Basic experience with databases, web servers, email systems

• Security certification

We enable you to:

Be a Trusted Advisor

Our global expertise includes various industries, such as Financial Services, Insurance, Transportation & Logistics, Healthcare, Government, and Legal. We are a significant player in the RPA and broader intelligent automation market through strategic partnerships and embedded technology licensing with leading vendors. As part of our team, you're a member of a trusted community that continually strives to achieve the best results for our customers.


Be Limitless

Every opinion counts. Our flat hierarchy allows team members from across the globe and functions to propose and collaborate on new ideas. We provide several opportunities for feedback, both from leaders and directly to our managers. The leadership team at ABBYY is ready to chat about your ideas and your colleagues are ready to support you.


Be Flexible

Work-life balance looks a little different for everyone. Employees regularly collaborate with their managers to design a workday that works best with flexible hours. Our different time off programs allow employees to set aside personal time for educational conferences, volunteering, and other activities. Let’s find the balance that allows you to be your most successful.


Be Yourself

The success of our employees is a top priority for us. We value a culture of trust, collaboration, and respect by fostering open communication, a continuous cycle of feedback, and recognition. We know every team member brings unique value and aspirations. Grow your career through our learning development programs and be supported by our employee resource groups and other people programs. We can’t wait to learn more about you.


ABBYY is an Equal Employment Opportunity employer that values the strength that diversity brings to the workplace.


Quick response

Required Knowledge
  • K0001   Knowledge of computer networking concepts and protocols, and network security methodologies.
  • K0005   Knowledge of cyber threats an`d vulnerabilities.
  • K0033   Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).
  • K0061   Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
  • K0104   Knowledge of Virtual Private Network (VPN) security.
  • K0106   Knowledge of what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities.
  • K0179   Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • K0205   Knowledge of basic system, network, and OS hardening techniques.
  • K0332   Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Required Skills
  • S0007   Skill in applying host/network access controls (e.g., access control list).
  • S0059   Skill in using Virtual Private Network (VPN) devices and encryption.
  • S0077   Skill in securing network communications.
  • S0121   Skill in system, network, and OS hardening techniques. (e.g., remove unnecessary services, password policies, network segmentation, enable logging, least privilege, etc.).
  • S0367   Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Required Abilities
  • A0123  Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).