Who We Are:
At Brooks, we believe movement is the key to feeling more alive. That’s why we’re driven to create gear and experiences that take people to the place that makes them feel more alive — whether it’s a headspace, a feeling, or a finish line.
Everyone who works at Brooks is propelled by a company culture that sparks excitement, fuels collaboration, inspires creativity, and ignites innovation.
Our brand values help bond us together and drive our success:
· Runner First
We act in the best interest of the runner
· Word is Bond
We do what we say we’ll do
· Champion Heart
We give our all in everything we do
· There is no “I” in Run
We stay generous with our humanity
· Keep Moving
We find ways to move every day, because joy is kinetic!
We welcome everyone from every walk of life looking to inspire others through the power of movement — because we’re all moving towards something. Let’s run there.
Your Job:
The Information Security team is seeking a talented security professional to drive business critical information security initiatives focusing on securing our users and systems. You will serve as a security consultant to key internal IT departments, ensuring their projects incorporate appropriate security controls. You will build a deep understanding of our technical infrastructure, software products, and processes. You will be expected to design, plan and implement strategic and tactical security improvements that will support and protect our business. In addition, as a Brooks Senior Information Security Engineer, you will be expected to provide analysis, definition, and recommendations of information security requirements for all enterprise technologies, computing assets and network infrastructure.
The scope of this role is greater than any one person. Candidate must be skilled in leveraging both internal and external resources through persuasion, management, and negotiation to accomplish security goals in areas where candidate may only possess Tier 2 skills.
This is a tremendous ownership opportunity to help Brooks secure the future success of its business.
Responsibilities:
Security Control Design and ImplementationEnsure the rigorous application of cybersecurity policies, principles, and practices in the delivery of all IT and cybersecurity servicesDesign, and implement cost-effective, controls to reduce business risk from real-world attacks such as ransomware, DDoS, data theft, and account takeoversDesign and optimize our network boundary protections and sensitive data flows using tools such as firewalls, VPNs, IPS/IDS, CASB, wireless security, network access controls, and web and email security Implement and support Single Sign-on, PAM, Multi-factor Authentication, Enterprise Mobility Management, security certificates and the SIEM solutionsIdentifies, plans, and documents improvements to security controls already in placeSecurity Advocate within the BusinessPlay an advisory role in IT projects to assess security requirements and controls and to ensure that security controls are implemented Lead or manage efforts on penetration testing, code reviews, design/architecture, and system security reviews.Assess applications and the associated data flows for risk to sensitive data, systems, or infrastructure.Provide management and business clients with information related to security and threat trends to protect the company from internal and external intrusions and risksAct as an agent of security awareness, foster and influence good internal information security practices through presentations, training, and other communication opportunitiesIncident Handling and ResponseAct as an escalation point in the investigations of cyber alerts, events, and incidents to ensure thorough investigation and responseReview and recommend improvements to incident response process and procedures and lead annual exercises Maintain Situational AwarenessValidate Hardware and Software InventoriesEnsure all systems and devices on the company network are adequately patched and hardened Maintain a current awareness of information security issues and trends and provide educational briefings to peer groups within the Information Technology departmentMaintain professional security certifications and accreditations Other responsibilities as requiredQualifications:
Bachelor’s degree in IT, Computer Science or related discipline preferred7 years’ experience maturing and improving information security programsComfortable leveraging outside experts for implementation assistance and supportSystem engineer level understanding of infrastructure technologies such as Active Directory, virtualization, and Windows operating systemsFunctional knowledge of modern networking protocols such as TCP/IP, IPSEC, VPN, MPLS, and SD-WANUnderstanding of cyber kill chain as it relates to attacks by cyber-criminals against corporationsExperience implementing security controls including IDS/IPS, firewalls, EDR, MFA, SSO, PAM, and email filteringExperience using SIEM tools for log collection, incident detection, and investigationExcellent written and verbal communication skillsPersuasive negotiator able to exert influence without authorityExperience identifying cost-effective solutions for complex problems within corporate enterpriseExcellent analytical, troubleshooting, and problem-solving skillsSolid grasp of vulnerability management, including an understanding of the process and activities associated with vulnerability identification and remediationDemonstrated ability to identify security events based on network, computer, and user behavior and investigate to eliminate false positivesDemonstrated ability to identify security vulnerabilities in proposed solutions and suggest alternatives that accomplish business goals while reducing riskExperience hardening and applying modern security standards across servers, workstations, SaaS-based solutions, and network equipmentDemonstrated track record staying up to date with Information Security and threat intelligence knowledge across the security and tech communities.Knowledge of security frameworks and methodologies such as CIS Top 18, NIST Cybersecurity Framework, and PCI DSSRemain flexible in your point-of-view to support the direction taken by the businessPossess solid understanding of cryptography basics (public/private keys, TLS certificates, PKI, etc.)Professional certifications such as GCIH, CISSP, CySA+ a plusCompensation: Our compensation reflects the cost of labor across US geographic markets. The base pay for this position ranges from $115,493 per year in our lowest geographic market up to $210,680 per year in our highest geographic market. Base pay offered will consider the specific geographic market and will vary depending on job-related knowledge, skills, and experience.
Brooks is proud to offer a robust benefits package to our employees and their families!
Benefits: including medical, dental, vision, life and AD&D insurance, disability insurance, HSA and employer contribution, FSA, family & fertility assistance, 401K Savings Plan and match, employee assistance program, and transportation assistance.
Paid Time Off: Brooks offers generous time off including up to five weeks of paid time off, eleven paid holidays, paid sick and parental leave.
Bonus: In addition to base pay, Brooks employees may also be offered an annual bonus based on company performance.
Perks: Including product discounts, employee recognition, fitness discounts, volunteer and donation benefits.
At Brooks, we celebrate diversity & equity. We are committed to creating an inclusive environment, and encourage people of all backgrounds, perspectives, experiences, and skills to apply. Brooks is proud to be an equal employment opportunity employer. All employment decisions are made without regard to race, religion, creed, color, national origin, age, sex, gender, gender identity or expression, two-spirit identity, sexual orientation, genetic information, sensory, physical, or mental disability, marital status, pregnancy (including childbirth and related conditions), honorable discharge or military status, protected citizen status, actual or perceived victims of domestic violence, sexual assault or stalking, HIV or Hepatitis C infection, political ideology, use of a trained guide dog by a person with a disability, or on any other basis protected by federal, state or local law, or any other non-merit based factors.