Sign in

Senior IT Security Engineer

Horsham, Pennsylvania, United States
December 04, 2018


Senior IT Security Software engineer with 10+ years of system and network security experience. Dedicated and passionate about security, having strong knowledge on security best practices and tools. Responsible for performing vulnerabilities risk assessment, proactively protecting systems and mitigating risk of security breaches. In case of a breech, responsible for responding and invoking appropriate actions. Provides security reports to management.

Understands security software and has technical ability to install, configure and maintain it.

Possesses strong technical ability, excellent communication skills, and motivation to accomplish results in a dynamic work environment. Takes a lead role as a security expert, teaches others and conducts trainings. Provides consulting and contributes to security guidelines and processes.

Comfortable with working in a fast-pace, agile, environment. Effectively communicates with customers, peers and management. Works closely with development, operations and QA to streamline applications building, testing, deployment and monitoring. Creates, maintains, and documents tools and automation for reliable and transparent operation.

Resolves technical issues through debugging, research, and investigation. A degree of creativity and latitude is required.

Typically reports to a supervisor or manager.


• Formal Education: Bachelor’s degree in Computer Science, Software Engineering, Computer/Electrical Engineering or equivalent

• 10+ years of engineering experience.

Top 5 Skills:

• Must have Expert level Linux knowledge

• Must have Strong programming experience (8+ years) especially shell scripting. The more programming/scripting knowledge, the better (such as Python, Javascript, Powershell, Ruby, Perl, Java, C/C++, C#)

• Must have Expert Network security knowledge, hardening processes and intrusion detection systems

• Must have Expert level knowledge of vulnerabilities assessments and best-practice tools (for port scanning, known exploit, GUI, fuzzing, and OS hardening). [5+ years]

• Knowledge of cryptographic protocols and public/private key infrastructure.