What are the responsibilities and job description for the Cybersecurity Engineer position at CAYS Inc?
Job Details
Hello People,
Cybersecurity Engineer
Location : Princeton, NJ (Onsite for 4-6 weeks then hybrid/remote)
Duration : 6 Month Contract
Duration : 6 Month Contract
The Cybersecurity Engineer is responsible for the architecture, implementation, and examination of IT security systems and controls. Influence modern security practices and support organizational strategies to effectively combat and protect enterprise network and infrastructure. Functions as a security analyst, incident responder, information security liaison, and internal support resource to maintain a strong security presence.
Responsibilities:
Research, architect, implement, engineer and monitor security solutions including networks, servers, endpoints and cloud infrastructure across a wide variety of systems and data types.
Identify, define and document security controls. Transform information security recommendations into actionable IT security programs and solutions.
Act as the subject matter expert for multiple security product suites including firewall, IPS, EDR/XDR, vulnerability scanning, email security, web proxy, SEIM and data lake.
Interface with audit department to provide requested information and evidence. Understand, address and close findings in a complete and timely fashion.
Prepare, document and maintain operating procedures, incident response procedures, security standards and troubleshooting guides. Create detailed playbooks for defined security processes.
Triage, investigate, and escalate relevant security events for review. Comprehend incident response process and cooperate with appropriate teams and partners to manage incidents.
Analyze daily security alerts and work with external professional services to address to address security events in real time. Collaborate to remediate threats and improve security controls.
Engineer SEIM monitoring, reporting, and detection across various systems, incorporating aspects of XDR and SOAR to discover and resolve misconfigurations, threats, and attacks.
Analyze vulnerability reports and security assessments to create and support actionable mitigation practices. Perform self-assessments of existing administered systems to identify security gaps.
Understand encryption practices and technology including SSL/TLS, S/MIME, IPsec, Site to Site VPNs and data at rest encryption. Recognize new standards and maintain a modern environment.
Architect, implement, and support MFA solutions, SSO integrations, and PKI infrastructure.
Design and monitor security controls for various cloud computing environments.
Contribute to a 24/7 on-call rotational schedule to serve as the immediate escalation contact for all security relevant matters. Expected to prioritize security matters when required.
Attune knowledge and skills of security best practices and industry trends. Research new technologies and threats. Engage in education opportunities and pursue applicable certification.
Skills, Knowledge and Abilities:
Excellent verbal, written and technical skills. Able to take highly technical information and present it to varied audiences in a manner easily understood.
Hands on experience designing, implementing, operating and troubleshooting complex IT security solutions in a dynamic work environment.
Able to work independently, as well as with a team, with the ability to transform high level requirements into well thought out, well documented, actionable plan.
Genuine interest of security topics, technologies and trends. Drive to learn, grow, and adapt to the everchanging IT landscape and security threats.
Technical writing skills with the ability to transform repeatable IT and security processes into referenced documentation.
Detail-oriented observational and scribing skills as it relates to investigation, intelligence gathering, and incident response management.
Experiences with incident response to include internal investigation, forensic investigation, and/or professional consultation.
Experience administering, engineering, and analyzing data lake and SEIM technologies from Sumo Logic, Varonis, and/or CrowdStrike.
Experience managing enterprise endpoint protection technologies such as Symantec, McAfee and/or CrowdStrike or equivalent solutions.
Experience designing, implementing, and supporting security gateway solutions including Firewalls, IDS/IPS and VPNs from Checkpoint, Cisco and/or Palo Alto.
Experience architecting, implementing and supporting Internet proxy server and web filtering solutions such as Zscaler, Forcepoint and/or McAfee.
Experience with email hygiene and anti-spam solutions including Mimecast, Proofpoint or similar solutions.
Experience with data encryption technologies and PKI digital certificate solutions from Microsoft and DigiCert or equivalent.
Experience with back-office products such as Windows, Linux, DHCP, DNS, Active Directory, RADIUS, IIS, Exchange, SQL Server, VMware ESX and Windows networking.
Experience with load balancing technologies such as F5, NetScaler and AWS ELB.
Experience with Web Application Firewalls (WAF) such as F5 Silverline, F5 Distributed Cloud and AWS WAF.
Experience with provisioning and managing networking and security controls within public cloud providers such as AWS and Azure.
Experience partnering with third-party Managed Security Service Providers and Information Security providers.
Education and Experience:
5-7 years of progressive work experience as an IT/cyber systems/security engineer.
Bachelor's degree in computer science, information systems, or equivalent related work experience required.
CompTIA Security (Plus), Network (Plus), A (Plus) certifications are preferred.
Microsoft Azure, AWS or equivalent cloud security certifications are preferred.
Vendor and product specific certifications are considered a plus where applicable.
Regards,
Vijay Bhaskar.
Lead Delivery Manager.
.
.
.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.