Cybersecurity Engineer

Posted 7hrs ago

Employment Information

Education
Salary
Experience
Job Type

Report this job

Job expired or something wrong with this job?

Job Description

Cybersecurity Engineer responsible for maintaining security in compliance-driven environments for Teal. Protecting clients through security monitoring, vulnerability management, and incident response.

Responsibilities:

  • Under the direction of the Director of Services, the Cybersecurity Engineer is experienced in managing cloud infrastructure, deploying/maintaining security monitoring solutions, automation, vulnerability management and other SecOps skills in compliance driven environments.
  • Responsible for protecting our internal and external clients as a member of our high touch, customer centric team.
  • Will be exposed to many different technologies, compliance frameworks, and cybersecurity methodologies. Expected to be resourceful in finding solutions.
  • Perform security reviews, identify gaps in security architecture.
  • Verify that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations.
  • Support Security Analysts by performing incident response activities (containment and eradication) when escalation is needed.
  • Verify and update security documentation reflecting the application/system security design features.
  • Deploy, support, and manage Network Security Monitoring (NSM), Endpoint Detection and Response (EDR), and Vulnerability Management solutions.
  • Deploy, manage, support, and secure compliance driven on-premises environments and cloud environments in Microsoft GCC High.
  • Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
  • Perform remediation and remediation management on identified vulnerabilities in cloud and on-premises environments.
  • Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.
  • Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).
  • Assess the effectiveness of security controls, implement security controls, and manage security controls.
  • Assess all the configuration management (change configuration/release management) processes and support their management.
  • Employ secure configuration management processes.
  • Deploy, manage, and support Network Access Control (NAC), Application Control, and Data Loss prevention solutions.
  • Provide advice on project costs, design concepts, or design changes.
  • Provide input on security requirements to be included in statements of work and other appropriate procurement documents.
  • Translate proposed capabilities into technical requirements.
  • Configure and optimize network hubs, routers, and switches for security monitoring.
  • Design and implement group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs.
  • Maintain baseline system security according to organizational policies.
  • Manage cybersecurity system/server resources including performance, capacity, availability, serviceability, and recoverability.
  • Apply security policies to meet security objectives of the system.
  • Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.
  • Implement specific cybersecurity countermeasures for systems and/or applications.
  • Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
  • Coordinate with enterprise-wide cyber defense staff to validate network alerts.
  • Coordinate with Cyber Security Analysts to manage and administer the updating of rules and signatures (e.g., intrusion detection/protection systems, antivirus, and content blacklists) for specialized cyber defense applications.
  • Perform system administration on specialized cyber defense applications and systems (e.g., antivirus, audit and remediation) or Virtual Private Network (VPN) devices, to include installation, configuration, maintenance, backup, and restoration.
  • Build, install, configure, and test dedicated cyber defense hardware.
  • Create, edit, and manage network access control lists on specialized cyber defense systems (e.g., firewalls and intrusion prevention systems).
  • Identify potential conflicts with implementation of any cyber defense tools (e.g., tool and signature testing and optimization).
  • Employ approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness).
  • Deployment, Configuration, and support of Conditional Access Control (CAC) and Mobile Device Management (MDM) Solutions.

Requirements:

  • Minimum 5 years of paid experience in a similar role or roles that provide a significant overlap of skills required to perform day-to-day job functions.
  • Experience in Microsoft GCC High and GovCloud Environments and implementing security controls on those specific platforms, including conditional access control.
  • Must be a US Person as defined by 22 CFR § 120.62.
  • Experience in deployment, management, and configuration of NSM, MDR, EDR, XDR, UEM, MDM, NAC, Application Control, Phishing and Vulnerability Management solutions.
  • Expert Level understanding and application of networking principals in production environments.
  • Expert Level understanding and application of Modern Operating system management and deployment methodologies.
  • Formal education or certifications that support and reinforce skills required for performance of day-day job duties.
  • Highly responsive.
  • Excellent oral and written communication skills.
  • Ability to read/speak/write at a high level.
  • The role requires high level written communication skills.
  • Ability to document work and maintain accurate records.
  • Resourceful – the ability to figure things out.
  • High attention to detail.
  • Maintain a professional appearance, demeanor, and team-oriented behavior; have mutual respect for management and team members; partner with others to create an exceptional experience for each and every client.
  • Punctual, dependable, goal oriented, and able to receive constructive coaching.

Benefits:

  • Competitive salary and performance-based incentives.
  • Comprehensive benefits package, including paid time off, paid holidays, health, dental, vision, life insurance, disability, and retirement plans.
  • Ongoing professional development and training opportunities.
  • Collaborative and supportive work environment.
  • Opportunity to work with cutting-edge technologies and gain hands-on experience.