Information Security Engineer

Drive Your Career

Lear Corporation is the leading Tier 1 automotive supplier serving all of the world’s major automotive manufacturers with our world-class automotive seating and automotive electrical products. Our products are developed and produced by a diverse, talented team of more than 165,000 people. With operations in 39 countries, Lear operates in every major automotive manufacturing region in the world. For our globally positioned and successful teams, we are looking for dedicated talents with zest for action and enthusiasm. If you love challenges, want to experience development opportunities unrestrained, and want recognition that pays off, then you’ve come to the right place with Lear.

INFORMATION SECURITY ENGINEER
SOUTHFIELD, MICHIGAN

The Information Security Engineer will provide oversight, guidance and support of the organization’s defensive capabilities. This includes deploying and supporting corporate security tools and systems, including but not limited to next-generation firewalls, proxy servers, IPS/IDS, EDR/XDR, cloud security, monitoring systems and remote access technologies. Candidate will act as a subject matter expert between various IT and Operating organizations to ensure proper design, configuration, and implementation of effective security controls for enterprise network systems, defensive technologies, as well as work in tandem with the Incident Response Team in responding to and remediating security incidents.

The Role:

Your work will include, but not be limited to:

  •  Secure the enterprise by applying security requirements; planning, implementing, and testing security systems; preparing security standards, policies, and procedures, employing automation where applicable
  • Develop and maintain clear and concise documentation of configurations and network security designs and perform security reviews, identify gaps in security architecture, and contribute to a security risk management plan
  • Working with other members of the Information Security and Information Technology teams, research, design, and advocate new technologies and security products that will support security requirements for the enterprise and its customers, business partners and vendors
  • Working with other Information Security team members, recommend configuration changes to improve the performance, usability, and value of cyber analysis/detection tools
  • Proactively research and analyze potential impact of new threats and exploits and communicate risks to relevant business units
  • Provide advice on vulnerabilities or potential vulnerabilities within architecture (on-premise and cloud) to enable the Information Security team to effectively evaluate and develop secure solutions, based on the threat landscape
  • Where necessary, the Information Security Engineer will be responsible for performing log analysis or other network forensic procedures in cooperation with appropriate teams to conduct and participate in cyber investigations
  • Actively contribute to the development and maintenance of the ongoing Information Security strategy
  • Contribute to periodic cyber intelligence products that will be delivered to internal audience, helping to enhance situational awareness of management and leadership teams

Your Qualifications:

  • 4 years of experience designing, implementing, and administering information security technologies, with a heavy focus on network and perimeter security
  • Experience utilizing network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth)
  • Authentication, authorization, and access control, and access authentication methods
  • Communication methods, principles, and concepts that support the network infrastructure
  • Capabilities and applications of network equipment including firewalls, routers, switches, servers, transmission media, and related hardware
  • In-depth understanding of encryption algorithms
  • Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL])
  • Network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools
  • Familiarity with the use of demilitarized zones
  • Network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services
  • Network design processes, to include understanding of security objectives, operational objectives, and trade-offs
  • Expertise with common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications
  • Network security device configuration, implementation, policy development & management, Network Access Control (NAC), segmentation, remote access, cloud security concepts, and intrusion detection/prevention
  • Employing system design tools, methods, and techniques, including automated systems analysis and design tools
  • Relating cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
  • Risk management processes (e.g., methods for assessing and mitigating risk)
  • Laws, regulations, policies, and ethics as they relate to cybersecurity and privacy
  • Results-oriented with a track record for leadership and self-directing. Must be able to provide accurate analysis and appropriate security management action plans

Bonus If You Have:

  • Strong personal work ethic, unquestionable ethics, and integrity
  • Clear and effective oral and written communication and presentation skills
  • Experience operating across international boundaries
  • A good facilitator and consensus builder who knows how to interact effectively within all areas of the organization
  • Highly self-motivated individual who will provide security guidance to the global IT and business leadership community
  • Credibility as an advisor to IT and business management on issues related to management of security risk through effective internal controls and related policy and procedure implementation
  • Proactive thought leader and possess the ability to establish, maintain and influence effective working relationships with colleagues and internal customers.

Lear Corporation is an Equal Opportunity Employer, committed to a diverse workplace.

Applicants must submit their resume for consideration using our applicant tracking system. Due to the high volume of applications received, only candidates selected for interviews will be contacted. Candidates must be legally authorized to work in the United States without sponsorship. Unsolicited resumes from search firms or employment agencies, or similar, will not be paid a fee and will become the property of Lear Corporation.

More Information

Apply for this job

Leave your thoughts

Share this job

Lear

(0)