Logo
Quaker Houghton

Quaker Houghton is hiring: Cybersecurity Engineer II in Conshohocken

Quaker Houghton, Conshohocken, Montgomery County, United States

Save Job

Current job opportunities are posted here as they become available.

At Quaker Houghton, we are experts in the development, production and application of chemical specialties, process fluids, lubricants and coatings for the manufacturing industry. We have been an integral part in the growth of the world’s largest industrial companies and to this day our experience and expertise show in the actions and dedication of our Associates worldwide. Today, we have a global presence, with our corporate headquarters located in Conshohocken, PA. Quaker Houghton is a global publicly traded company with a unique collaborative culture that supports career growth for its associates and offers competitive compensation and benefit programs.

Summary

Reporting to the Information Security Manager, the Cybersecurity Engineer II will operate and manage Quaker Houghton’s application and infrastructure security systems and assist in response and prevention of moderately complex IT / Cybersecurity related incidents. The Cybersecurity Engineer II will support the business objectives of the company in securing various infrastructure components including operating systems, databases and networking (LAN, Wireless and WAN), servers, IOT devices, cloud infrastructure and Quaker public websites and other related systems within Quaker Houghton.

Responsibilities

  • Perform daily technical cybersecurity operations in production, development, staging with implementation, development and maintaining technical security controls: threat management, vulnerability management, SIEM and incident detection tasks.
  • Perform incident handling (e.g., forensic collections, intrusion correlation/tracking, threat analysis, and direct system remediation) tasks to support Incident Response Process and document incidents from initial detection through final resolution
  • Collect all monthly statistics on the Quaker Houghton Cybersecurity environment and prepare monthly reporting.
  • Oversee the Vulnerability Management program focusing on an asset level report weekly to ensure that outstanding issues are resolved. Lead weekly operational review meetings with a cross functional group of stakeholders to track and report on progress.
  • Will backup the rest of the team on cyber related issues within Microsoft Intune.
  • Will provide assistance with Microsoft Data Classification, DLP and other data related monitoring tasks as part of the team.
  • Operate, maintain and provide unsolicited advice on Quaker Houghton technical Cybersecurity defense and operations
  • Assist in technical IT (cybersecurity) projects
  • Review and maintain Standard Operating Procedures as it relates to Cyber Security operations.
  • Analyze and make recommendations to improve and secure network, system, and application architectures
  • Review and make recommendations to information security policies, architectures, and standards when required
  • Provides Quaker Houghton IT operations team with operational third line support and guidance when required. Partner with the Global infrastructure team on projects and maintaining the global infrastructure and is proficient in global information technology.

Key Education or Certification Required

  • Bachelor’s degree in Information Technology, Cyber Security, Risk Management or equivalent combination of education and experience required
  • CompTIA Security+, MCSE, CEH or equivalent preferred

Required Minimum Number of Years of Relevant Experience

  • 3+ years of IT infrastructure experience
  • 3+ years knowledge and hands-on experience with different security domains or disciplines (e.g. network security, endpoint security, protocols and associated hardware)
  • 3+ years’ general experience in vulnerability scanning, firewall, WAN, LAN, Wireless (preferable Cisco), antivirus & malware analysis, proxy, IDS/IPS, log correlation tools, SIEM, DLP, NAC, and application firewall solutions.

Required Skills and Competencies

  • Familiar with principles as RBAC, OWASP, Layered Defense and Defense in Depth
  • Strong understanding of common computing attack vectors; information, host and network security hardening and requirements; networking protocols; common intrusion techniques; and common risk management concepts
  • Require knowledge of IT frameworks as ITIL 3.0
  • Requires advanced knowledge of Linux, Microsoft Operating Systems, Microsoft Server, Azure and Office 365
  • Practical experience with security concepts, content filtering, vulnerability scanning, and anti-malware, and similar security tools
#J-18808-Ljbffr