Information Security Lead

Bounteous
1dRemote

About The Position

Bounteous is a premier end-to-end digital transformation consultancy dedicated to partnering with ambitious brands to create digital solutions for today’s complex challenges and tomorrow’s opportunities. With uncompromising standards for technical and domain expertise, we deliver innovative and strategic solutions in Strategy, Analytics, Digital Engineering, Cloud, Data & AI, Experience Design, and Marketing. Our Co-Innovation methodology is a unique engagement model designed to align interests and accelerate value creation. Our clients worldwide benefit from the skills and expertise of over 4,000+ expert team members across the Americas, APAC, and EMEA. By partnering with leading technology providers, we craft transformative digital experiences that enhance customer engagement and drive business success. Information Security Operations Engineer is a member of the Gen Re Security team, who will leverage extensive experience in security operations to oversee and enhance proactive defenses and response capabilities. The candidate shall work closely with Security and other IT practice leads to ensure that detection logic, incident response workflows, data quality, automation, and team collaboration are continuously improved and effectively managed. The role entails strategic planning, research, testing, and implementation of new solutions, as well as the operation and maintenance of current solutions. The candidate must have a strong background in technology, security and metrics, and must be highly adaptive. The candidate must be highly organized and analytical and is expected to partner and mentor effectively with other teams on an ongoing basis.

Requirements

  • Proficiency with SIEM, EDR, and Infrastructure as a Service.
  • 5+ years of IT Support experience focusing on IT Security and Security Operations.
  • Outstanding communication (verbal, written, and listening) and customer service skills.
  • Familiarity with IT security controls, protocols, and best practices.
  • Ability to interact with all levels of management.
  • Self-starter with the ability to work independently and in a team setting.
  • Bachelor’s or master’s degree in computer science, information systems or other related field, or equivalent work experience.
  • Professional security management certification, such as ISC(2) Certified Information Systems Security Professional (CISSP), SANS GIAC Information Security Professional (GISP), GIAC-Security

Responsibilities

  • Promote and enforce awareness of key information security practices, including acceptable use of information assets, malware protection, and password security protocols
  • Identify, assess, and report security risks, focusing on how these risks impact the confidentiality, integrity, and availability of information assets
  • Understand and evaluate how data is stored, processed, or transmitted, ensuring compliance with data privacy and protection standards (GDPR, CCPA, etc.)
  • Ensure data protection measures are integrated throughout the information lifecycle to safeguard sensitive information
  • Refine detection logic and improve alert fidelity across platforms such as CrowdStrike, Taegis, and Varonis.
  • Enhance incident response workflows and update runbooks to reflect current tooling and evolving threat scenarios.
  • Perform gap analysis and coverage mapping to ensure security data quality, log integrity, and timestamp accuracy.
  • Implement security automation and orchestration to reduce manual effort and improve operational efficiency.
  • Conduct reviews of alerts and enforce effective timely incident investigation.
  • Formalize collaboration between offensive and defensive security teams to integrate findings into detection logic and strengthen security posture.
  • Monitor and optimize SIEM telemetry to improve detection capabilities and reduce false positives.
  • Lead threat hunting initiatives and proactively identify indicators of compromise across enterprise systems.
  • Perform end-to-end security incident response, including triage, containment, eradication, recovery, and post-incident analysis.
  • Monitor and assess AI-driven tooling and platforms to ensure compliance with governance policies, regulatory requirements, and risk management standards
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service