What are the responsibilities and job description for the Cyber Security Engineer II position at cFocus Software Incorporated?
cFocus Software is seeking a Cyber Security Engineer II to join our program supporting the Defense Counterintelligence Security Agency (DCSA) in Washington, DC. This position requires an active Top Secret clearance.
Qualifications:
Qualifications:
- Bachelors degree in Computer Science, Information Technology, Cyber Security, or a related field.
- 4-6 years of hands-on experience in cyber security roles, with a strong foundation in network security, vulnerability management, and incident response.
- Proficient in implementing and managing security controls across diverse IT environments.
- Active certifications such as CISSP, CEH, or CISM.
- Expertise includes conducting risk assessments, developing security policies, and ensuring compliance with regulatory and DoD standards.
- Effective communication skills enable them to collaborate with technical teams and stakeholders, while their analytical abilities allow them to troubleshoot complex security issues and recommend robust solutions.
- Continuous learning and staying updated with emerging cyber threats and technologies are integral to their role in enhancing organizational security posture.
- Implement and manage robust security solutions such as firewalls, IDS/IPS systems, and VPNs to safeguard organizational networks and systems.
- Conducting thorough vulnerability assessments, penetration testing, and security audits are routine to identify and mitigate potential risks.
- Responding to security incidents, conducting forensic analysis, and recommending preventive measures are crucial responsibilities.
- Ensuring compliance with regulatory standards through the development and maintenance of security policies and procedures is essential.
- Collaborating closely with cross-functional teams, providing security guidance and support, and promoting security awareness and training are also key aspects of the role.
- Staying abreast of emerging cyber threats and technologies allows for proactive adaptation of security measures, ensuring robust protection of organizational assets and data.