Previous Job
 Information Security Engineer
Ref No.: 17-00319
Location: san francisco, California
 Information Security Engineer
San Francisco
The Security Analyst will perform the following security duties. 

• Responsible for internal Qualys scans 
• Analyze and create vulnerability tracking spreadsheets for engineers to utilize for remediation, tracking and verification. 
• Establish patch management quarterly cycles – facilitate meetings with engineering groups to push patches in a timely manner. 
• Conduct external vulnerability and web application scans – these scans are required for PCI compliance and is sent to the financial institutions doing business with StubHub. 
• Responsible for SECINFOSEC Jira tickets 
• Track all scans executed – INFOSEC has a security calendar that identifies all scans and penetration tests for StubHub that is used to accurately track, plan and distribute to our internal partners. 
• Strong skills in Microsoft Excel and creating tracking documents, such as vulnerability tracking. 
• Implementing SPLC including dynamic scanning and application security best practices in the development lifecycle 
• Help to provide input or coordinate data on small incidents 
• In-depth understanding of common operating systems (Linux/Windows), networking protocols, databases, and Internet applications development 
• Must have thorough knowledge in IS security components, principles, standards, procedures and practices. 
• Liaison to the product teams to work with the correct GIS groups to support StubHub customers 
• Ability to communicate technical security information to non-technical personnel 
• Strong interpersonal and communication skills 
• Ability to work independently in a self-directed manner and collaboratively as a member of a security team 

The manager is looking for a Junior candidate with 1-2 years of experience. 

1. What are the must have skills you are looking for in contingent worker? 

Information security analyst. Junior candidate. 1-2 years of experience with INFO SEC. Operational work. Pen test remediation, tracking, internal qualys scans. 

• Taking technical reports and communicating with partner group to patch a vulnerability. 

• Detail oriented, problem solving skills, and good communication skills 

Interview process: 

Phone screen then meet with a panel. no more than 2 hours 

Day to day: 

review and processing change request