Our client, a global private equity firm, hired Planet Technology to help them identify talent to fill their
Security Engineering and Analysis needs.
The Security Engineer would focus on evaluating existing and proposed technical architectures for security risk, as well as provide technical guidance on mitigation. This engineer would monitor industry trends and threat landscapes, and recommend necessary controls or countermeasures.
Interacting with leadership within the client’s technology team, the engineer would provide input regarding security protocols related to all aspects of on-premise and cloud environments. The role required hands-on experience with enterprise security architecture, engineering, and implementation. It also necessitated experience establishing metrics and reporting to track coverage and effectiveness of security processes and a solid understanding of agile, DevSecOps pipelines, and CI/CD integration. Additionally, the client needed someone with a proven track record in securing Azure, SaaS, and cloud infrastructure environments.
The Security Analyst would act as a key contributor on the Security Operations team and be responsible for monitoring their on-premise and cloud environments. This cross-functional role required partnering with members of the infrastructure team to review, analyze, and investigate security issues utilizing implemented security technologies. Additionally, the analyst would execute threat assessments, implement mitigations, and enhance related processes/procedures.
Planet Technology successfully found and placed talented individuals to fill both the Security Engineer and Security Analyst roles.
Throughout the project, the Security Engineer:
The Security Analyst applied forensic and cyber-defense skills as a primary responder to triage alerts on endpoints, cloud, and network infrastructure and were also involved in vulnerability detection/remediation and end user training.
Planet Technology provided the talent the client needed to carry this project across the finish line. By leading security investigations and documenting incident response activity, the client significantly improved their security posture.
Photo Credit: Canva