• Senior Cyber Security Engineer, Data Management

    Job Location(s) US-NJ-Pennsauken
    Requisition #
    Work From Home (Virtual)
  • Overview

    Founded in 1951, Iron Mountain Incorporated (NYSE: IRM) is the global leader in storage and information management services. Iron Mountain is committed to storing, managing and transforming what our customers value most, from paper records to data to priceless works of art and culture. Providing a full suite of solutions – records and information management, data management, digital solutions, data centers and secure destruction – Iron Mountain enables organizations to lower storage costs, comply with regulations, recover from disaster, and protect their data and assets from a complex world. Visit the company website at www.ironmountain.com for more information.


    Iron Mountain is an equal opportunity employer, and does not unlawfully discriminate on the basis of race, color, religion, sex, national origin, marital status, age, sexual orientation, gender identity characteristics or expression, disability, medical condition, U.S. Military or veteran status or other legally protected classifications in making employment decisions.


    As Senior Cyber Security Engineer the successful candidate will be a key member of the Data Management Office of the CTO group.  This is a hands-on role - candidates should be ready to design, build, and maintain secure systems. They should also be comfortable in the role of an internal security consultant, communicating thoughtfully with the rest of the team about security design concerns and trade-offs. The position will include a mix of high-level security architecture design and engineering, day-to-day operational security tasks, and building and maintaining security infrastructure. The ideal candidate should be results driven; be detail oriented, and possess superior problem solving and consultative skills. The individual should have the ability to work in a diverse team environment and be able to prioritize projects and/or deliverables.


    Principal duties and responsibilities

    • Primary role: Certified security professional. Secondary role: solid understanding of Governance, Risk and Compliance (GRC) methodology. Both will be demonstrated by a combination of work experience, training and certification programs.
    • Hands-on experience in Firewall management.
    • Strong foundation in data protection and encryption technology.
    • Work experience in Cloud Multi-Tenancy environment.
    • Understanding in compliance audit and controls such as PCI, HIPA, SOX, FedRAMP, FISMA, ISO7200
    • Research, design, engineer, monitor and support the implementation of information security solutions for the organization.
    • Identify security deficiencies or gaps and design cost-effective solutions to mitigate them.
    • Document security standards, solutions, data flows, procedures, and other technical information as directed.
    • Contribute to automation and facilitation of security solutions and services combined.
    • Provides expert technical advice to technical staff within the appropriate technical discipline.
    • Availability to work on-call and non-standard hours when necessary.
    • Provide management level updates as required.
    • Mentor other members of the technical staff.
    • Good understanding in Cross platform Virtualization and Cloud technologies
    • Service Automation, Orchestration engines – nice to have



      • Experience implementing security controls in a carrier grade data center environment.
      • Strong experience with a broad range of security technologies, including NextGen Firewalls, DLP, NAC, IDS/ IPS, IdAM, PKI, Certificate Management, SOC, SIEM, Endpoint Protection, Anti-malware, vulnerability management, to name but a few.
      • Experience with logging and alerting platforms, including SIEM integration and tools such as Splunk, syslogNG, and ELK.
      • Experience of risk assessment tools, technologies and methods
      • Experience with design, deployment and administration of multi-factor authentication systems such as RSA SecureID token, Biometric/user accounts
      • Experience in performing threat analysis, vulnerability assessment, and penetration testing.
      • Experience with Vulnerability assessment tools such as Nessus/Tenable, OpenVAS, and Tripwire360.
      • Experience with Endpoint security including host based IDS/IPS, host base firewall, antivirus and anti-malware such as Trend Micro.
      • Experience with investigations of security incidents, anomalies and events
      • Experience planning, researching and developing security policies, standards and procedures
      • Experience with securing Web and Mobile Applications, Application Security best practices, Secure SDLC, software security designs, OWASP and SANS.
      • Experience in incident response from inside/outside threat-actors
      • Knowledge in secure networks, systems and application architectures
      • Knowledge of disaster recovery, computer forensic tools, technologies and methods
      • Ability to communicate network security issues to peers and management
      • Ability to read and use the results of mobile code, malicious code, and anti-virus software
      • Strong hands on experience and successful implementation and management large enterprise security technology.
      • Strong interpersonal, written, and oral communication skills
      • Highly self-motivated and directed, with keen attention to detail, and proven analytical and problem-solving abilities
      • Able to effectively prioritize tasks when under pressure
      • Ability to communicate network security issues to peers and management
      • Ability to read and use the results of mobile code, malicious code, and anti-virus software
      • Experience working in a team-oriented, collaborative environment


      Education Required:

      • Minimum Bachelor’s degree in a technology field, or equivalent experience required.


      Experience Required:

      • Minimum of 7 years of experience in Cloud and enterprise class security environments.


      Professional Qualification: 

      CISM, CCSP, CCSE, CCIE Security, GIAC, CISA, and/or CISSP certification preferred.