Eng Iii, Network Security Engineer
About the Role
Overview The GN&T Network Security team is looking for a highly motivated and experienced Cybersecurity Engineer to join the Network Security Defense team. The Defense teams are responsible for owning the security lifecycle and effectiveness across the Core, Edge, and Access networks, as well as all systems and network functions within GN&T. In this role, you will advance our security posture through real‑time threat monitoring & detection using SIEM tools such as Splunk, lead incident response efforts during a breach, and manage the continuous vulnerability management lifecycle across networks and applications. The position requires expertise in defining and implementing robust security architecture, including firewalls, encryption, centralized identity and access management, and multi‑factor authentication (MFA). A strong candidate will also possess advanced threat hunting skills, including advanced networking & protocol analysis, endpoint & memory forensics, data science & querying, and demonstrable experience in automation & scripting to enhance our cybersecurity tooling. Key Responsibilities Support the identification of technology gaps in the design, architecture, and implementation of appropriate security solutions. Maintain formal guidelines, policies, and procedures to ensure smooth and error‑free operations. Create and tune threat detections using SIEM to improve alert fidelity and reduce false positives. Drive continuous improvement of network visibility and telemetry collection to strengthen detection and response capabilities. Support network security incident response activities, including triage, containment, eradication, and recovery for disruptive threats. Maintain and refine incident playbooks and response runbooks, ensuring repeatable workflows for high‑impact scenarios such as ransomware, phishing, insider threat, and DDoS. Serve as a support engineer for security‑related investigations, providing analysis and input during active incidents. Support root cause analysis and produce clear incident reports outlining timeline, impact, evidence, and remediation recommendations. Explore proactive threat hunting across identity, endpoint, and network telemetry to uncover adversary behavior and reduce dwell time. Perform regular security control assessments, validating configuration effectiveness and closing gaps discovered during incidents or hunts. Communicate clearly and effectively, articulating complex technical concepts to diverse internal and external audiences. Where you’ll be working In this hybrid role, you have a defined work location that includes working from home and a minimum of three days per week in the office, set by your manager. Employees must be within commuting distance of one of the listed locations. What we’re looking for Bachelor’s degree or 3+ years of relevant work experience, demonstrated through work, military experience, or specialized training. Experience with Splunk SPL searches, including macros, data models, and lookups for efficient threat hunting and investigation. Knowledge of incident response lifecycles (NIST or SANS) and experience with automation playbooks using SOAR platforms. Experience with risk‑based alerting, managing notable events, asset/identity correlation, and defining/tuning correlation searches. Ability to work independently and collaboratively with cross‑functional teams. Strong analytical skills, attention to detail, and effective written, interpersonal, and verbal communication skills. Even better if you also have Security certifications such as CompTIA Security+, CISSP, CCIP, CISM, CCSP, OSCP, CEH. Experience with network protocols and information security with networking certifications such as PCNSE, CCNP, or CCNA. Experience with Identity and Access Management (IAM) solutions. Strong working knowledge of incident response frameworks such as NIST and MITRE ATT&CK on network, system, and application layers. Experience with scripting languages like Python and/or automation tools like Ansible. Experience with big‑data analytical tools, such as Elasticsearch, for automating security deployments and compliance checks. Benefits and Compensation Competitive salaries and performance‑based incentives. Market‑competitive benefits from top providers, including health, dental, vision, disability, life, and supplemental insurances. Comprehensive health and wellbeing resources, including an Employee Assistance Program. Generous paid time off, flexible working arrangements, and annual paid holidays. Training and development opportunities across all levels, including education assistance and access to industry research. Volunteering opportunities supporting environmental, community, and sustainability commitments. Equal Employment Opportunity Verizon is an equal opportunity employer. We evaluate qualified applicants without regard to veteran status, disability, or other legally protected characteristics. Salary and Incentives The annual salary range for the location(s) listed on this job requisition based on a full‑time schedule is: $81,000.00 – $155,000.00. For the Illinois location(s) listed on this job requisition, it is: $89,000.00 – $155,000.00. This is an incentive‑based position with the potential to earn more. For part‑time roles, compensation will be adjusted to reflect hours worked. #J-18808-Ljbffr
Required Skills
Keywords
Interested in this role?
Apply now and take the next step in your career.
