What are the responsibilities and job description for the Cybersecurity Engineer - Vulnerability Assessment & Risk Mitigation position at Artmac Soft LLC?
Who we are :
Artmac Soft is a technology consulting and service-oriented IT company dedicated to providing innovative technology solutions and services to Customers.
Job Description :
Job Title : Cybersecurity Engineer Vulnerability Assessment & Risk Mitigation
Job Type : C2C
Experience : 8 to 15 Years
Location : Atlanta, New York
Responsibilities :
- Strong understanding of OWASP Top 10 vulnerabilities and remediation strategies.
- Hands-on experience with BurpSuite, SAST / DAST tools (e.g., Veracode, AppScan), and penetration testing.
- Familiarity with investigative tools like Splunk, EFK, Dynatrace, and Web Application Firewalls (WAF).
- Proficiency in cloud security configurations, especially Azure.
- In-depth knowledge of risk frameworks, vulnerability identification, and mitigation strategies.
- Experience with DevSecOps concepts and automated security scans.
- Strong communication skills for influencing stakeholders and driving progress on compliance initiatives.
- Ability to write and implement security standards and requirements.
- Familiarity with HTTP debugging tools and incident response practices.
- Experience with tools like QuantumMetric and handling logs or monitoring alerts.
- Knowledge of PCI and SOC compliance standards.
- Understanding of cryptography and secure data transmission techniques.
- Strong programming skills to automate communications and notifications.
- Manage and lead incident response activities, including triage, communication, containment, root cause analysis, and remediation.
- Assess and prioritize security detections from logs and monitoring alerts for anomalies or bot traffic.
- Review application design, architecture, and configuration to recommend security best practices.
- Research, design, and develop solutions to meet compliance and security requirements for Site Security & Reliability Engineering.
- Enhance defense-in-depth strategies to protect critical IT assets and data.
- Ensure secure handling of data using cryptography and encryption methods.
- Monitor logs and respond to detected security incidents.
- Act as a liaison to development teams, ensuring security issues are identified and resolved.
Qualification :