Senior Cybersecurity Engineer (System Engineer)
Job Summary
Fortive is seeking a highly motivated and experienced Cybersecurity Engineer to join our Security Engineering team. The ideal candidate will possess a strong foundation in security engineering principles coupled with deep hands-on experience in Linux/Unix environments. This role is critical for enhancing our security posture by developing implementing and maintaining security controls with a specific focus security engineering tooling such as the Security Information and Event Management (SIEM) platform for advanced threat detection and analysis.
Key Responsibilities
Security Systems Engineering & Architecture
Design and Implementation: Develop deploy and maintain robust security solutions across the organizations infrastructure ensuring alignment with security policies and best practices.
Incident Response Support: Assist the Security Operations Center (SOC) and Incident Response teams during security incidents providing deep technical analysis and remediation support.
Scripting & Automation: Utilize Bash Python or comparable scripting languages to automate security tasks system monitoring and log collection across Linux/Unix environments.
Access Control: Manage and audit user accounts permissions and authentication mechanisms (e.g. SSH sudo) on critical servers and security tools
Troubleshooting: Perform in-depth security-focused troubleshooting on systems analyzing system logs and network traffic.
SIEM & Threat Detection
Log Ingestion & Parsing: Configure manage and optimize log ingestion from various sources (especially Linux/Unix) into the SIEM platform (e.g. Splunk).
Query Language Expertise: Demonstrate proficiency in query languages (e.g. Splunk Search Processing Language (SPL) KQL or SQL variants) to perform complex log analysis threat hunting and investigative tasks.
Monitoring & Analysis: Continuously monitor security events investigate high-priority alerts generated by the SIEM and document findings and remediation steps.
Troubleshooting Log Gaps: Proactively monitor log collection health identify and remediate any gaps or failures in log flow from Linux/Unix hosts to the SIEM including resolving issues related to network connectivity or log rotation configurations.
Required Qualifications & Skills
Experience: 3-5 years of experience in a dedicated Cybersecurity or Information Security role with an emphasis on engineering and operations.
Linux/Unix Expertise: Mandatory deep hands-on experience in securing configuring and administering Linux/Unix operating systems.
Security Tools Proficiency: Proven experience with security tools such as firewalls Intrusion Detection/Prevention Systems (IDS/IPS) Endpoint Detection and Response (EDR) and Network Access Control (NAC).
SIEM/Log Analysis: Direct experience working with a major SIEM platform (e.g. Splunk CrowdStrike Sentinel) and demonstrated ability to write complex search queries for threat detection.
Networking: Strong understanding of TCP/IP network protocols and common network security services (DNS DHCP VPNs etc.).
Scripting: Proficiency in at least one scripting language (Python or Bash) for automation.
Preferred Qualifications
Relevant professional certifications (e.g. CompTIA Security Linux CEH CISSP SANS GIAC).
Familiarity with cloud security concepts (AWS Azure or GCP).
Experience with Infrastructure as Code (IaC) tools like Ansible or Terraform.
Required Experience:
Senior IC
Fortive Corporation Overview Fortive’s essential technology makes the world stronger, safer, and smarter. We accelerate transformation across a broad range of applications including environmental, health and safety compliance, industrial condition monitoring, next-generation product d ... View more