What are the responsibilities and job description for the Cyber Security Engineer (NO C2C) position at e.biT Consulting?
IT SECURITY ENGINEER
The IT Security Engineer is responsible for ensuring the confidentiality, integrity, and availability of an organization’s information systems and data. This role involves designing, implementing, and maintaining security measures to protect against cyber threats, vulnerabilities, and data breaches. The IT Security Engineer will work closely with other IT teams to deploy security technologies, monitor network activity, and respond to security incidents.
Duties and Responsibilities include but are not limited to the following:
COMMON CORE ROLES
Network Security and Infrastructure Protection:
- Design and implement security architectures, policies, and procedures to protect company networks, systems, and data.
- Manage and configure firewalls, intrusion detection/prevention systems(IDS/IPS), and other network security technologies.
- Implement and manage Virtual Private Networks(VPNs), Secure Sockets Layer (SSL), and other secure communications protocols.
Endpoint Security:
- Deploy and maintain endpoint protection software(antivirus, endpoint detection and response - EDR, etc.).
- Monitor and enforce security controls across servers, workstations, mobile devices, and other endpoints.
- Perform regular vulnerability assessments and patch management to ensure endpoint security is up to date.
Incident Detection and Response:
- Monitor security alerts and events using Security Information and Event Management (SIEM) tools.
- Investigate and respond to security incidents, including data breaches, malware attacks, and unauthorized access.
- Conduct post-incident analysis, prepare incident reports, and implement corrective actions to prevent recurrence.
Vulnerability Management:
- Regularly conduct vulnerability assessments and penetration testing on internal and external systems.
- Collaborate with development teams to fix vulnerabilities and weaknesses in applications, systems, and infrastructure.
- Maintain an up-to-date inventory of vulnerabilities and ensure timely remediation.
Access Control and Identity Management:
- Design and implement strong identity and access management (IAM) solutions, including user authentication, authorization, and role-based access controls (RBAC).
- Enforce multi-factor authentication (MFA) and least privilege access across all platforms.
- Manage privileged access and ensure secure management of credentials.
Data Protection and Encryption:
- Ensure the encryption of sensitive data both at rest and in transit.
- Develop and implement data loss prevention (DLP) policies and monitor for potential data exfiltration risks.
- Assist with compliance initiatives and relevant data protection regulations.
Security Audits and Compliance:
- Conduct regular security audits and assessments to ensure compliance with industry standards and regulations.
- Prepare for and support external audits and certifications.
- Develop and maintain documentation for security policies, procedures, and best practices.
Training and Awareness:
- Conduct security awareness training for employees to promote a security-conscious culture.
- Provide guidance to other IT staff on security best practices and potential risks.
ADDITIONAL RESPONSIBILITIES
- Perform daily duties in line with Client’s Information Security Policies and Procedures.
- Ensure that Information Confidentiality, Integrity, and Privacy is always maintained with processing information assets.
QUALIFICATIONS:
- Bachelor’s degree in information technology, Computer Science, or related field(or equivalent experience).
- 5 years of experience in IT security or related IT fields, with hands-on experience in network security, endpoint protection, and vulnerability management.
- Strong knowledge of network protocols, firewalls, VPNs, and encryption techniques.
- Experience with SIEM tools (e.g., Splunk, SolarWinds, ArcSight).
- Hands-on experience with security incident management, including identifying, containing, and responding to cyberattacks.
- Familiarity with endpoint protection technologies and solutions (e.g., Sentinel One, CrowdStrike, Symantec, Carbon Black).
- Solid understanding of security best practices, including least privilege, secure software development, and data protection.
PREFERRED CERTIFICATIONS:
- Certified Information Systems Security Professional (CISSP)
- Certified Ethical Hacker(CEH)
- Certified Information Security Manager (CISM)
- Certified Cloud Security Professional (CCSP)
- CompTIA Security
- GIAC Security Essentials (GSEC)
- Cisco Certified Network Associate (CCNA) Security
Technical Skills:
- Proficiency with firewalls, VPN, IDS/IPS, and other network security devices.
- Strong knowledge of operating systems(Windows, Linux, Unix, etc.) and security configurations.
- Familiarity with cloud security principles and platforms (e.g., AWS, Azure, Google Cloud).
- Experience with scripting or automation (e.g., Python, PowerShell, Bash) is a plus.
- Knowledge of security standards and frameworks (e.g., NIST, ISO 27001, CIS Controls).
Soft Skills:
- Strong analytical and problem-solving skills.
- Excellent written and verbal communication skills.
- Ability to work independently and as part of a collaborative team.
- Strong attention to detail and a proactive approach to security.
- Ability to prioritize and manage multiple tasks effectively in a fast-paced environment.