In this role, the selected candidate will be responsible for working closely with the Security Operations Center (SOC) team as an escalation point for complex problem analysis and incident troubleshooting.
This role serves as a "hands-on" technical staff person who provides technical cyber and information security architecture expertise and guidance to team members and collaborates with other it teams to address and resolve security issues.
In this role, the selected candidate will provide pre-sales technical support to Check Point Global Account Managers and strategic Check Point customers, developing POCs & crafting revenue generating services in order to influence sales.
In this role, the selected candidate will provide complex technical oversight and enforcement of security directives, orders, standards, plans and procedures at server sites; develop manuals and ensures system support personnel receive/maintain security awareness and training.
This position is responsible for corruption bugs to include stack overflows, heap overflows, integer overflows, and logical flaws. Experience with mitigation (ASLR, Stack cookies, non-executable memory) to deter exploitation and how can they be bypassed.
In this role, the selected candidate will oversee user access process to ensure operational integrity of the system; enforce the information security configuration and maintains system for issuing, protecting, changing and revoking passwords.
In this role, the selected candidate will execute ongoing audit reviews in assigned technical discipline in support of our compliance goals and facilitate periodic audits as scheduled for regulatory compliance.
In this role, the selected candidate must have a hands on experience in security systems, including firewalls, intrusion detection systems, antivirus software, authentication systems, log management, content filtering, etc.
In this role, the successful candidate will be responsible for leveraging extensive experience in network exploitation and defense, maintain a current knowledge of attack vectors and methodologies and apply this knowledge to identify vulnerabilities in an assigned network.