Information Security Engineer - EDR
  • United Arab Emirates Abu Dhabi
  • Halian
1 year before
31.01.2024
Protect and Defend
Cyber Defense Infrastructure Support
Job Description

Information Security Engineer - Cybereason EDR

We are seeking an exceptional Information Security Engineer with a strong emphasis on Cybereason Endpoint Detection and Response (EDR) to join our team. As a subject matter expert in Cybereason EDR, you will play a crucial role in delivering product presentations, conducting proof of concepts, and providing implementation support specifically for Cybereason EDR solutions. Your deep expertise in Cybereason EDR will be instrumental in fortifying our organization's endpoint security and threat detection capabilities.

Key Responsibilities:
• Cybereason EDR Subject Matter Expertise: You will possess comprehensive knowledge of Cybereason EDR and its advanced features and functionalities. Your expertise will extend to Network Access Control (NAC), Data Classification and Prevention, Data Rights Management, Data Leakage Prevention, and Information Rights Management within the Cybereason EDR framework.
• Schema Design and Data Protection Policy: You will be responsible for designing effective schema structures and data protection policies within Cybereason EDR. Your expertise will ensure the appropriate configuration and optimization of Cybereason EDR to safeguard critical data and prevent security breaches.
• Data Discovery and Classification: Leveraging Cybereason EDR, you will identify unstructured data and classify it within both on-premises and cloud repositories. This includes developing comprehensive data classification strategies and implementing them using Cybereason EDR's robust capabilities.
• End-to-End Cybereason EDR Implementation: You will oversee the entire lifecycle of Cybereason EDR, ensuring its successful deployment and operation from a post-sales perspective. This entails handling post-sales support, troubleshooting, and optimization to maximize the effectiveness of the solution.
• Compliance and Document Requirements: Working closely with clients, you will assist in achieving compliance standards, such as GDPR and HIPAA, through the implementation of Cybereason EDR for data classification and prevention. You will collaborate with clients to identify specific document requirements and align the Cybereason EDR solution accordingly.
• Cybereason EDR Expertise in Endpoint Security: As a Senior Information Security Engineer, you will have hands-on experience with Cybereason EDR and a range of endpoint security products and technologies. Your expertise in Cybereason EDR will enable seamless integration within the overall endpoint security infrastructure.
• Endpoint Troubleshooting and Monitoring: Leveraging your expertise in network troubleshooting tools like Wireshark, you will proactively identify and resolve endpoint-related issues. You will monitor endpoint activities using Cybereason EDR to detect and respond to potential security threats effectively.
• Presentation and Training: Conducting product training sessions for strategic accounts following Cybereason EDR implementation, you will effectively communicate technical information to educate clients and stakeholders on the capabilities and advantages of Cybereason EDR.
Qualifications:
• Bachelor's degree in Computer Science, Information Technology, or a related field.
• Extensive experience in implementing and managing Cybereason EDR solutions, with a strong emphasis on endpoint security and threat detection.
• In-depth knowledge of Cybereason EDR features and capabilities, along with a solid understanding of related technologies such as Network Access Control (NAC), Data Rights Management, and Data Leakage Prevention.
• Familiarity with securing Office 365 environments and working knowledge of CIS Security benchmarks.
• Proven experience in designing and implementing cybersecurity solutions, including firewalls, endpoint security, DLP, encryption, and web application security.
• Excellent understanding of network protocols, encryption protocols, AAA Radius, L2, TP, IPSEC, firewalls, and 802.1Q.
• Strong communication skills and the ability to present complex technical concepts to C-level executives and senior management.
• Relevant certifications such as Certified Information Systems Security Professional (CISSP), Cybereason Certified Professional, or other related certifications would be advantageous.


Quick response

Required Knowledge
  • K0001   Knowledge of computer networking concepts and protocols, and network security methodologies.
  • K0004   Knowledge of cybersecurity and privacy principles.
  • K0005   Knowledge of cyber threats an`d vulnerabilities.
  • K0033   Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).
  • K0042   Knowledge of incident response and handling methodologies.
  • K0044   Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • K0061   Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
  • K0179   Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • K0324   Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.

Required Skills
  • S0007   Skill in applying host/network access controls (e.g., access control list).
  • S0053   Skill in tuning sensors.
  • S0077   Skill in securing network communications.
  • S0367   Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Required Abilities
  • A0123  Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).