Proterra
Proterra offers a dynamic and supportive workplace where our employees can thrive personally and professionally. With cutting‑edge facilities and groundbreaking projects, Proterra offers unique opportunities to grow, collaborate, and lead transformative change in the electrification of heavy‑duty transportation and equipment.
Our commitment to innovation extends beyond our battery solutions to our people, where we create an environment where everyone feels valued, supported, and empowered to drive change for the earth. Here at Proterra we strive to foster a culture of inclusivity, valuing diverse perspectives and encouraging bold ideas, allowing our employees to bring their full selves to work. Our employees benefit from competitive total rewards packages, and opportunities to develop professionally.
Position Overview The Information Security Engineer will be responsible for developing, enhancing, and executing Information Security Operations at Proterra. In this position you will assist with the maintenance and implementation of IT security systems to protect Proterra’s corporate, manufacturing, cloud and IoT environments from cyber‑attacks. You will maintain and lead incident response and escalations with our security operations center, be responsible for vulnerability management and participate in the creation or improvement of company security policies/procedures. You will be responsible for conducting/leading risk assessments and participating in and supporting security assessments and audits. Additionally, you will be assisting with evaluation, setup and utilization of new security products and technologies.
Responsibilities
Identify and analyze potential threat activity targeting client networks via monitoring systems, alerts, vulnerabilities, SIEM tools and network traffic and respond for immediate remediation.
Work with cross‑functional teams to support security requirements to protect organization’s corporate, manufacturing, cloud and IoT environments from cyber‑attacks.
Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host‑based intrusion detection systems, anti‑virus/advanced EDR, SIEM/event correlation, file integrity monitoring, full packet captures, computer forensics, encryption, vulnerability management, data loss prevention and application scanning.
Coordinate and take action needed for remediation generated by incident reports and manufacturer recommended patching and hotfixes.
Assist Crowdstrike Falcon Complete team in remediation of critical information security incidents in coordination with 3rd party SOC team.
Implement and maintain security controls and have a suitable knowledge of existing cyber threats to infrastructure and clouded environments.
Participate in scheduled security assessment activities and projects to ensure industry compliance.
Initiate and maintain Security Incident Response Plan (SIRT) and After‑Action Reports (AARs) to maintain operational continuity.
Identify, analyze and interpret threat actors and malicious activity in client environments, act upon and take the appropriate actions towards remediation and documentation.
Differentiate between potential intrusion attempts and pinpoint false alarms by working with EDR, Identity Protection and NextGen SIEM to develop resolution plans.
Perform third‑party vendor assessments and fulfill Proterra security assessment requirements.
Triage and respond to security events – serve as a primary responder for incidents, taking ownership and tracking through resolution.
Perform other related duties as assigned.
Your Experience Includes
3–5 years of related information technology infrastructure experience with identity and access management (IAM), SSO solutions including SAML 2, OAuth 2, OIDC.
Some experience in securing enterprise networks, including firewalls, VPNs, intrusion detection/prevention systems (IDS/IPS), and secure network protocols (e.g., IPsec, SSL/TLS) with heavy emphasis on SaaS apps such as Crowdstrike Falcon Complete, Netskope DLP, Nessus Tenable and asset management platforms such as Axionus.
Overall knowledge of endpoint protection technologies (e.g., anti-malware, EDR, DLP), and experience in managing and securing workstations, mobile devices, and servers.
Participation in penetration testing, vulnerability assessments, and red teaming exercises.
General understanding of industry standards, compliance, and legal requirements (ISO 27001, FedRAMP, NIST 800‑171, NIST 800‑53, SOC2, etc.).
Excellent troubleshooting abilities in software and hardware and be able to lead outage calls and troubleshooting conversations until resolved and provide detailed root‑cause analysis reports.
Above average understanding of vulnerability reporting using SaaS platforms such as Nessus Tenable.
Education
Bachelor's degree in computer science, Information Security, Electrical Engineering or Management Information Systems preferred. Equivalent years of consecutive IT security experience with recognized industry certifications may be considered.
Certifications
CISSP, CASP+, SSCP+, or other relevant security certificates.
Certified Ethical Hacking (CEH), CISSP, CISA.
Network+, Security+, Linux+ or combination of similar certificates acceptable.
Applicants must be authorized to work for any employer in the U.S. There is no immigration sponsorship available for this role (ex: H1‑B, OPT, CPT, TN or any other employment sponsorship).
Proterra is an Equal Employment Opportunity Employer, providing equal employment opportunities to all Employees and applicants for employment without regard to race, color, creed, religion, sex, sexual orientation, gender identity, national origin, disability, age, genetic information, veteran status, pregnancy, childbirth, or related medical conditions, including, but not limited to, lactation or any other characteristic protected by applicable federal, state, or local law or ordinance. Proterra participates in the Electronic Employment Verification Program (E‑Verify). Please copy and paste this link into your browser for e‑verification: http://www.uscis.gov/portal/site/uscis/menuitem.eb1d4c2a3e5b9ac89243c6a7543f6d1a/?vgnextoid=d6f988e60a405110VgnVCM1000004718190aRCRD&vgnextchannel=d6f988e60a405110VgnVCM1000004718190aRCRD
#J-18808-Ljbffr
Our commitment to innovation extends beyond our battery solutions to our people, where we create an environment where everyone feels valued, supported, and empowered to drive change for the earth. Here at Proterra we strive to foster a culture of inclusivity, valuing diverse perspectives and encouraging bold ideas, allowing our employees to bring their full selves to work. Our employees benefit from competitive total rewards packages, and opportunities to develop professionally.
Position Overview The Information Security Engineer will be responsible for developing, enhancing, and executing Information Security Operations at Proterra. In this position you will assist with the maintenance and implementation of IT security systems to protect Proterra’s corporate, manufacturing, cloud and IoT environments from cyber‑attacks. You will maintain and lead incident response and escalations with our security operations center, be responsible for vulnerability management and participate in the creation or improvement of company security policies/procedures. You will be responsible for conducting/leading risk assessments and participating in and supporting security assessments and audits. Additionally, you will be assisting with evaluation, setup and utilization of new security products and technologies.
Responsibilities
Identify and analyze potential threat activity targeting client networks via monitoring systems, alerts, vulnerabilities, SIEM tools and network traffic and respond for immediate remediation.
Work with cross‑functional teams to support security requirements to protect organization’s corporate, manufacturing, cloud and IoT environments from cyber‑attacks.
Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host‑based intrusion detection systems, anti‑virus/advanced EDR, SIEM/event correlation, file integrity monitoring, full packet captures, computer forensics, encryption, vulnerability management, data loss prevention and application scanning.
Coordinate and take action needed for remediation generated by incident reports and manufacturer recommended patching and hotfixes.
Assist Crowdstrike Falcon Complete team in remediation of critical information security incidents in coordination with 3rd party SOC team.
Implement and maintain security controls and have a suitable knowledge of existing cyber threats to infrastructure and clouded environments.
Participate in scheduled security assessment activities and projects to ensure industry compliance.
Initiate and maintain Security Incident Response Plan (SIRT) and After‑Action Reports (AARs) to maintain operational continuity.
Identify, analyze and interpret threat actors and malicious activity in client environments, act upon and take the appropriate actions towards remediation and documentation.
Differentiate between potential intrusion attempts and pinpoint false alarms by working with EDR, Identity Protection and NextGen SIEM to develop resolution plans.
Perform third‑party vendor assessments and fulfill Proterra security assessment requirements.
Triage and respond to security events – serve as a primary responder for incidents, taking ownership and tracking through resolution.
Perform other related duties as assigned.
Your Experience Includes
3–5 years of related information technology infrastructure experience with identity and access management (IAM), SSO solutions including SAML 2, OAuth 2, OIDC.
Some experience in securing enterprise networks, including firewalls, VPNs, intrusion detection/prevention systems (IDS/IPS), and secure network protocols (e.g., IPsec, SSL/TLS) with heavy emphasis on SaaS apps such as Crowdstrike Falcon Complete, Netskope DLP, Nessus Tenable and asset management platforms such as Axionus.
Overall knowledge of endpoint protection technologies (e.g., anti-malware, EDR, DLP), and experience in managing and securing workstations, mobile devices, and servers.
Participation in penetration testing, vulnerability assessments, and red teaming exercises.
General understanding of industry standards, compliance, and legal requirements (ISO 27001, FedRAMP, NIST 800‑171, NIST 800‑53, SOC2, etc.).
Excellent troubleshooting abilities in software and hardware and be able to lead outage calls and troubleshooting conversations until resolved and provide detailed root‑cause analysis reports.
Above average understanding of vulnerability reporting using SaaS platforms such as Nessus Tenable.
Education
Bachelor's degree in computer science, Information Security, Electrical Engineering or Management Information Systems preferred. Equivalent years of consecutive IT security experience with recognized industry certifications may be considered.
Certifications
CISSP, CASP+, SSCP+, or other relevant security certificates.
Certified Ethical Hacking (CEH), CISSP, CISA.
Network+, Security+, Linux+ or combination of similar certificates acceptable.
Applicants must be authorized to work for any employer in the U.S. There is no immigration sponsorship available for this role (ex: H1‑B, OPT, CPT, TN or any other employment sponsorship).
Proterra is an Equal Employment Opportunity Employer, providing equal employment opportunities to all Employees and applicants for employment without regard to race, color, creed, religion, sex, sexual orientation, gender identity, national origin, disability, age, genetic information, veteran status, pregnancy, childbirth, or related medical conditions, including, but not limited to, lactation or any other characteristic protected by applicable federal, state, or local law or ordinance. Proterra participates in the Electronic Employment Verification Program (E‑Verify). Please copy and paste this link into your browser for e‑verification: http://www.uscis.gov/portal/site/uscis/menuitem.eb1d4c2a3e5b9ac89243c6a7543f6d1a/?vgnextoid=d6f988e60a405110VgnVCM1000004718190aRCRD&vgnextchannel=d6f988e60a405110VgnVCM1000004718190aRCRD
#J-18808-Ljbffr