Who We Are:
At Brooks, we believe a run can change a day, a life, the world. Everyone who works here is a key part of our obsession to make the best running gear on the planet. We want our business — which also happens to be our passion — to be a place where everyone feels welcome and comfortable being themselves. Our company culture defines us, bonds us together, and drives our success. We live this culture daily through our brand values: Runner First, Word is Bond, Champion Heart, There is no “I” in Run, and Keep Moving. This means we always solve for the runner, do what we say we will, give it our all, are generous with our humanity, and find a way to keep moving every day, because joy is kinetic.
Are you ready to help create something extraordinary?
Your Job:
The Information Security team is seeking a talented security professional to drive business critical information security initiatives focusing on securing our users and systems. You will serve as a conduit between our information security, infrastructure, development & app support teams, building a deep understanding of our technical infrastructure, software products, and processes. You will be expected to design, plan, and implement strategic and tactical security improvements that will support and protect our business. In addition, as a Brooks Senior Information Security Engineer, you will be expected to provide analysis, definition, and recommendations of information security requirements for all enterprise technologies, computing assets, and network infrastructure.
The scope of this role is greater than any one person. Candidate must be skilled in leveraging both internal and external resources through persuasion, management, and negotiation to accomplish security goals in areas where candidate may only possess Tier 2 skills.
This is a tremendous ownership opportunity to help Brooks secure the future success of its business.
You Responsibilities:
- Security Control Design and Implementation
- Ensure the rigorous application of cybersecurity policies, principles, and practices in the delivery of all IT and cybersecurity services
- Design, and implement cost-effective controls to reduce business risk from real-world attacks such as ransomware, DDoS, data theft, and account takeovers
- Design and optimize our network boundary protections and sensitive data flows using tools such as firewalls, VPNs, IPS/IDS, CASB, wireless security, network access controls, and web and email security
- Implement and support Single Sign-on, PAM, Multi-factor Authentication, Enterprise Mobility Management, security certificates and SIEM solutions
- Identify, plan, and document improvements to security controls already in place
- Security Advocate within the Business
- Play an advisory role in IT projects to assess security requirements and controls and to ensure that security controls are implemented
- Lead or manage efforts on penetration testing, code reviews, design/architecture, and system security reviews.
- Assess applications and the associated data flows for risk to sensitive data, systems, or infrastructure.
- Provide management and business clients with information related to security and threat trends to protect the company from internal and external intrusions and risks
- Act as an agent of security awareness, foster and influence good internal information security practices through presentations, training, and other communication opportunities
- Incident Handling and Response
- Act as an escalation point in the investigations of cyber alerts, events, and incidents to ensure thorough investigation and response
- Review and recommend improvements to incident response process and procedures and lead annual exercises
- Maintain Situational Awareness
- Validate hardware and software inventories and work with inventory owners to reconcile differences and identify processes to improve inventory management.
- Ensure all systems and devices on the company network are adequately patched and hardened
- Maintain a current awareness of information security issues and trends and provide educational briefings to peer groups within the Information Technology department
- Maintain professional security certifications and accreditations
- Other responsibilities as required
Your Qualifications:
- Bachelor’s degree in IT, Computer Science or related discipline preferred
- 7+ years’ experience maturing and improving information security programs
- Comfortable leveraging outside experts for implementation assistance and support
- System engineer level understanding of infrastructure technologies such as Active Directory, virtualization, and Windows operating systems
- Functional knowledge of modern networking protocols such as TCP/IP, IPSEC, VPN, MPLS, and SD-WAN
- Understanding of cyber kill chain as it relates to attacks by cyber-criminals against corporations
- Experience implementing security controls including IDS/IPS, firewalls, EDR, MFA, SSO, PAM, and email filtering.
- Experience using SIEM tools for log collection, incident detection, and investigation
- Excellent written and verbal communication skills
- Persuasive negotiator able to exert influence without authority
- Experience identifying cost-effective solutions for complex problems within corporate enterprise
- Excellent analytical, troubleshooting, and problem-solving skills
- Solid grasp of vulnerability management, including an understanding of the process and activities associated with vulnerability identification and remediation
- Demonstrated ability to identify security events based on network, computer, and user behavior and investigate to eliminate false positives
- Demonstrated ability to identify security vulnerabilities in proposed solutions and suggest alternatives that accomplish business goals while reducing risk
- Experience hardening and applying modern security standards across servers, workstations, SaaS-based solutions, and network equipment
- Demonstrated track record staying up to date with Information Security and threat intelligence knowledge across the security and tech communities.
- Knowledge of security frameworks and methodologies such as CIS Top 18, NIST Cybersecurity Framework, and PCI DSS
- Remain flexible in your point-of-view to support the direction taken by the business
- Possess solid understanding of cryptography basics (public/private keys, TLS certificates, PKI, etc.)
- Professional certifications such as GCIH, CISSP, CySA+ a plus
Compensation: Our compensation reflects the cost of labor across US geographic markets. The base pay for this position ranges from $106,474 per year in our lowest geographic market up to $194,271 per year in our highest geographic market. Base pay offered will consider the specific geographic market and will vary depending on job-related knowledge, skills, and experience.
Other:
Brooks is proud to offer a robust benefits package to our employees and their families!
Benefits- including medical, dental, vision, life and AD&D insurance, disability insurance, HSA and employer contribution, FSA, family & fertility assistance, 401K Savings Plan and match, employee assistance program, and transportation assistance.
Paid Time Off- Brooks offers generous time off including three to five weeks of paid time off, eleven paid holidays, paid sick and parental leave.
Bonus- in addition to base pay, Brooks employees may also be offered an annual bonus based on company performance.
Perks- including product discounts, a home office stipend, employee recognition, fitness discounts, volunteer and donation benefits.
At Brooks, we celebrate diversity & equity. We are committed to creating an inclusive environment, and encourage people of all backgrounds, perspectives, experiences, and skills to apply. Brooks is proud to be an equal employment opportunity employer. All employment decisions are made without regard to race, religion, creed, color, national origin, age, sex, gender, gender identity or expression, two-spirit identity, sexual orientation, genetic information, sensory, physical, or mental disability, marital status, pregnancy (including childbirth and related conditions), honorable discharge or military status, protected citizen status, actual or perceived victims of domestic violence, sexual assault or stalking, HIV or Hepatitis C infection, political ideology, use of a trained guide dog by a person with a disability, or on any other basis protected by federal, state or local law, or any other non-merit based factors.
Tags
C
crypto
saas
security
information security
Apply to job