Current Statistics
1,547,435 Total Jobs 263,493 Jobs Today 17,681 Cities 222,734 Job Seekers 146,855 Resumes |
|
|
|
|
|
|
Security Engineer III - Seattle Washington
Company: Expedia, Inc. Location: Seattle, Washington
Posted On: 01/24/2025
If you need assistance during the recruiting process due to a disability, please reach out to our Recruiting Accommodations Team through the form. This form is used only by individuals with disabilities who require assistance or adjustments in applying and interviewing for a job. This form is not for inquiring about a position or the status of an application.Security Engineer IIIOur team at Expedia Group is primarily engaged in the design, development, deployment, and maintenance of Certificate and Secret Management Platform within our compute environment.We partner with different EG teams to help them onboard their applications, leverage cloud technologies and principles while maintaining strong security, governance, resiliency, and reliability.We are looking for a high-performing individual contributor who acts as a mentor to more junior engineers, applies new engineering principles to improve existing systems, and is responsible for leading complex, well-defined projects.What you will do: Analyzes requirements and assists with the design of architecture for central processing. Research information, data, trends, and best practices in emerging technology and share beneficial information with relevant stakeholders. Investigates standard or routine issues or incidents and drafts concise, balanced, evidence-based reports on findings. Conducts rigorous tests and inspections of products, services, solutions, or processes to evaluate quality or performance. Demonstrates knowledge of advanced and relevant technology. Exhibits comfort working with several forms of technology. Understands the relationship between applications, databases, and technology platforms. Brings together different stakeholders with varied perspectives to develop solutions to issues and contributes own suggestions. Thinks holistically to identify opportunities around policies/processes to increase efficiency across organizational boundaries. Assists with a whole systems approach to analyzing issues by ensuring all components (structure, people, process, and technology) are identified and accounted for. Performs routine responsibilities to procure, distribute, and maintain an inventory of technology assets, gaining depth of knowledge in this functional area. Gathers pertinent information about a problem by analyzing data and patterns and identifying underlying issues. Researches and recommends more detailed solutions to resolve problems. Implements solutions based on advanced knowledge of standard practices and previous experiences; escalates complex or unprecedented issues as needed. Performs more advanced information security engineering responsibilities, including engineering security solutions for non-routine assignments. Evaluates threat intelligence findings including attacker tactics, techniques, and procedures to suggest and implement security technology solutions to proactively identify and prevent security threats. May evaluate, implement, manage, and maintain a variety of information security systems and hardware including but not limited to intrusion prevention systems, packet capture systems, firewalls, security information & event management (SIEM) systems, log analysis platforms, endpoint detection and response platforms, anti-malware engines, malware sandboxes, email threat analysis systems, etc. May implement custom software, scripts, policies, extensions, or APIs to support the identification and prevention of information security threats. Collaborates with security operations analysts to understand and design solutions to security threats actively being observed and monitored in the environment.Who you are: 5+ years for Bachelor's or 3+ years for Master's or equivalent experience. Has strength in a couple of programming languages and/or one language with multiple technology implementations. Familiarity with the following technologies: |
|
|
|
|
|
|