Proterra offers a dynamic and supportive workplace where our employees can thrive personally and professionally. With cutting-edge facilities and groundbreaking projects Proterra offers unique opportunities to grow collaborate and lead transformative change in the electrification of heavy-duty transportation and equipment.
Our commitment to innovation extends beyond our battery solutions to our people where we create an environment where everyone feels valued supported and empowered to drive change for the earth. Here at Proterra we strive to foster a culture of inclusivity valuing diverse perspectives and encouraging bold ideas allowing our employees to bring their full selves to work. Our employees benefit from competitive total rewards packages and opportunities to develop professionally.
Position Overview:â
The Information Security Engineer will be responsible for developing enhancing and executing Information Security Operations at Proterra.â In this position you will assist with the maintenance and implementation of IT security systems to protect Proterras corporate manufacturing cloud and IoT environments from cyber-attacks. You will maintain and lead incident response and escalations with our security operations center be responsible for vulnerability management and participate in the creation or improvement of company security policies/ procedures.â You will be responsible for conducting/leading risk assessments and participating in and supporting security assessments and audits. Additionally you will be assisting with evaluation setup and utilization of new security products and technologies.â
About the Role You will:â
- Identify and analyze potential threat activity targeting client networks via monitoring systems alerts vulnerabilities SIEM tools and network traffic and respond for immediate remediation.
- Work with cross functional teams to support security requirements to protect organizations corporate manufacturing cloud and IoT environments from cyber-attacks.
- Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host-based intrusion detection systems anti-virus/advanced EDR SIEM/event correlation file integrity monitoring full packet captures computer forensics encryption vulnerability management data loss prevention and application scanning.â
- Responsible for the coordination and actions needed for remediation generated by incident reports and manufacture recommended patching and hotfixes.
- Identify and analyze potential threat activity targeting client networks via monitoring systems alerts vulnerabilities SIEM tools and network traffic and respond for immediate remediation.
- Work with cross functional teams to support security requirements to protect organizations corporate manufacturing cloud and IoT environments from cyber-attacksââ
- Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host-based intrusion detection systems anti-virus/advanced EDR SIEM/event correlation file integrity monitoring full packet captures computer forensics encryption vulnerability management data loss prevention and application scanning.â
- Responsible for the coordination and actions needed for remediation generated by incident reports and manufacture recommended patching and hotfixes.
- Assist Crowdstrike Falcon Complete team in remediation of critical information security incidents in coordination with 3rd party SOC team.â
- Implement and maintain security controls and have a suitable knowledge of existing cyber threats to infrastructure and clouded environments.â
- Participate in scheduled security assessment activities and projects to ensure industry compliance.â
- Initiate and maintain Security Incident Response Plan (SIRT) and After-Action Reports (AARs) to maintain operational continuityâ
- Identify analyze and interpret threat actors and malicious activity in client environments act upon and take the appropriate actions towards remediation and documentation.â
- Differentiate between potential intrusion attempts and pinpoint false alarmsâby working with EDR Identity Protection and NextGen SIEM to develop resolution plans.
- Perform 3rd party vendor assessments and fulfill Proterra security assessments requirements
- Triage and respond to security events - serve as a primary responder for incidents taking ownership of incidents and tracking through resolution.â
- Performs other related duties as assigned.â
Your Experience Includes:
- 3-5 years of related information technology infrastructure experienceâ with identity and access management IAM SSO solutions including (SAML 2 OAuth 2 OIDC).
- Some experience in securing enterprise networks including firewalls VPNs intrusion detection/prevention systems (IDS/IPS) and secure network protocols (e.g. IPsec SSL/TLS) heavy emphasis in SaaS apps such as Crowdstrike Falcon Complete Netskope DLP Nessus Tenable and asset management platforms such as Axionus.
- Overall Knowledge of endpoint protection technologies (e.g. anti-malware EDR DLP) and experience in managing and securing workstations mobile devices and servers.
- Have participated in penetration testing vulnerability assessments and red teaming exercises.
- General understating of industry standards compliance and legal requirements (ISO 27001 FedRAMP NIST 800-171 NIST 800-53 SOC2 etc.)â
- Excellent trouble-shooting abilities in software and hardware and be able to lead outage calls and trouble-shooting conversations until resolved and provide detailed root cause analysis reports.â
- Above average understanding in vulnerability reporting using Saas platforms such as Nessus Tenable.
Education:
- Bachelors degree in computer science Information Security Electrical Engineering or Management Information Systems preferred. Equivalent years of consecutive IT security experience with recognized industry certifications may be considered.
Certifications:
- CISSP CASP SSCP or other relevant security certificatesâ
- Certified Ethical Hacking (CEH) CISSP CISA
- Network Security Linux or combination of similar certificates acceptable.
Applicants must be authorized to work for any employer in the U.S. There is no immigration sponsorship available for this role (ex: H1-B OPT CPT TN or any other employment sponsorship).â
#LI-BJ1
Proterra offers a dynamic and supportive workplace where our employees can thrive personally and professionally. With cutting-edge facilities and groundbreaking projects Proterra offers unique opportunities to grow collaborate and lead transformative change in the electrification of heavy-duty trans...
Proterra offers a dynamic and supportive workplace where our employees can thrive personally and professionally. With cutting-edge facilities and groundbreaking projects Proterra offers unique opportunities to grow collaborate and lead transformative change in the electrification of heavy-duty transportation and equipment.
Our commitment to innovation extends beyond our battery solutions to our people where we create an environment where everyone feels valued supported and empowered to drive change for the earth. Here at Proterra we strive to foster a culture of inclusivity valuing diverse perspectives and encouraging bold ideas allowing our employees to bring their full selves to work. Our employees benefit from competitive total rewards packages and opportunities to develop professionally.
Position Overview:â
The Information Security Engineer will be responsible for developing enhancing and executing Information Security Operations at Proterra.â In this position you will assist with the maintenance and implementation of IT security systems to protect Proterras corporate manufacturing cloud and IoT environments from cyber-attacks. You will maintain and lead incident response and escalations with our security operations center be responsible for vulnerability management and participate in the creation or improvement of company security policies/ procedures.â You will be responsible for conducting/leading risk assessments and participating in and supporting security assessments and audits. Additionally you will be assisting with evaluation setup and utilization of new security products and technologies.â
About the Role You will:â
- Identify and analyze potential threat activity targeting client networks via monitoring systems alerts vulnerabilities SIEM tools and network traffic and respond for immediate remediation.
- Work with cross functional teams to support security requirements to protect organizations corporate manufacturing cloud and IoT environments from cyber-attacks.
- Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host-based intrusion detection systems anti-virus/advanced EDR SIEM/event correlation file integrity monitoring full packet captures computer forensics encryption vulnerability management data loss prevention and application scanning.â
- Responsible for the coordination and actions needed for remediation generated by incident reports and manufacture recommended patching and hotfixes.
- Identify and analyze potential threat activity targeting client networks via monitoring systems alerts vulnerabilities SIEM tools and network traffic and respond for immediate remediation.
- Work with cross functional teams to support security requirements to protect organizations corporate manufacturing cloud and IoT environments from cyber-attacksââ
- Oversee and maintain existing security tools as well as overall enterprise security systems that include network and/or host-based intrusion detection systems anti-virus/advanced EDR SIEM/event correlation file integrity monitoring full packet captures computer forensics encryption vulnerability management data loss prevention and application scanning.â
- Responsible for the coordination and actions needed for remediation generated by incident reports and manufacture recommended patching and hotfixes.
- Assist Crowdstrike Falcon Complete team in remediation of critical information security incidents in coordination with 3rd party SOC team.â
- Implement and maintain security controls and have a suitable knowledge of existing cyber threats to infrastructure and clouded environments.â
- Participate in scheduled security assessment activities and projects to ensure industry compliance.â
- Initiate and maintain Security Incident Response Plan (SIRT) and After-Action Reports (AARs) to maintain operational continuityâ
- Identify analyze and interpret threat actors and malicious activity in client environments act upon and take the appropriate actions towards remediation and documentation.â
- Differentiate between potential intrusion attempts and pinpoint false alarmsâby working with EDR Identity Protection and NextGen SIEM to develop resolution plans.
- Perform 3rd party vendor assessments and fulfill Proterra security assessments requirements
- Triage and respond to security events - serve as a primary responder for incidents taking ownership of incidents and tracking through resolution.â
- Performs other related duties as assigned.â
Your Experience Includes:
- 3-5 years of related information technology infrastructure experienceâ with identity and access management IAM SSO solutions including (SAML 2 OAuth 2 OIDC).
- Some experience in securing enterprise networks including firewalls VPNs intrusion detection/prevention systems (IDS/IPS) and secure network protocols (e.g. IPsec SSL/TLS) heavy emphasis in SaaS apps such as Crowdstrike Falcon Complete Netskope DLP Nessus Tenable and asset management platforms such as Axionus.
- Overall Knowledge of endpoint protection technologies (e.g. anti-malware EDR DLP) and experience in managing and securing workstations mobile devices and servers.
- Have participated in penetration testing vulnerability assessments and red teaming exercises.
- General understating of industry standards compliance and legal requirements (ISO 27001 FedRAMP NIST 800-171 NIST 800-53 SOC2 etc.)â
- Excellent trouble-shooting abilities in software and hardware and be able to lead outage calls and trouble-shooting conversations until resolved and provide detailed root cause analysis reports.â
- Above average understanding in vulnerability reporting using Saas platforms such as Nessus Tenable.
Education:
- Bachelors degree in computer science Information Security Electrical Engineering or Management Information Systems preferred. Equivalent years of consecutive IT security experience with recognized industry certifications may be considered.
Certifications:
- CISSP CASP SSCP or other relevant security certificatesâ
- Certified Ethical Hacking (CEH) CISSP CISA
- Network Security Linux or combination of similar certificates acceptable.
Applicants must be authorized to work for any employer in the U.S. There is no immigration sponsorship available for this role (ex: H1-B OPT CPT TN or any other employment sponsorship).â
#LI-BJ1
View more
View less