What are the responsibilities and job description for the IT Security Engineer position at Endurance IT Services?
We are seeking an IT Security Engineer to support and maintain our cybersecurity systems to ensure the protection of our network, applications, and information assets. This position focuses on the operational aspects of cybersecurity, including daily monitoring, patching, and system maintenance. The IT Security Engineer will assist in implementing security measures, maintaining existing tools, and responding to security incidents under the guidance of the Senior IT Security Engineer and Chief Information Security Officer (CISO). This will be a Hybrid position.
Responsibilities:
• Administer and maintain security tools, including endpoint protection, file system security, and SIEM platforms.
• Conduct vulnerability scans and assist in implementing remediation measures as directed by the Senior IT Security Engineer.
• Configure and manage email authentication technologies (SPF, DKIM, DMARC) to enhance email security.
• Perform patch management for security servers, applications, and devices to ensure compliance with security standards.
• Monitor security logs, alerts, and events using existing tools to detect anomalous activities and escalate incidents as necessary.
• Assist the Senior IT Security Engineer and CISO in responding to security incidents, including collecting data, executing containment actions, and documenting findings.
• Support the administration and troubleshooting of Active Directory components, including user accounts, Group Policies, and Organizational Units.
• Utilize security monitoring tools to track and analyze network traffic for anomalous activity, escalating issues as needed.
• Maintain and update baseline images for workstations and virtual machines to ensure secure configurations.
• Ensure systems and devices are hardened according to industry best practices and organizational security standards.
• Assist in implementing controls to ensure compliance with regulatory requirements such as GLBA, FERPA, and NIST.
• Document security procedures, system configurations, and operational processes to maintain accurate and auditable records.
• Address emerging issues and threats related to tickets, requests, logs, and alerts.
• Participate in routine configuration audits and maintain records of system changes.
• Assist in evaluating and testing new security tools and technologies for operational feasibility.
• Provide support for virtual environments, including VMware and Citrix platforms, as needed.
• Provide input for security awareness programs and assist in educating end-users on security best practices and policies.
• Develop and utilize basic scripts for automating security tasks, such as log parsing, report generation, or patch deployment.
• Assume other duties as assigned by the Senior IT Security Engineer or Chief Information Security Officer (CISO).
Qualifications:
• Bachelor’s degree in Computer Science, Information Systems, or a related field.
• Relevant certifications such as Security , SC-900, or CCNA are highly recommended.
• Experience with managing and troubleshooting security tools.
• Familiarity with Active Directory, Microsoft Office 365, and Azure environments.
• Basic understanding of firewalls, VPNs, and network security concepts.
• Competency with PowerShell and scripting for automation and configuration.
• Ability and willingness to communicate well and to work cooperatively with others at all levels of the organization.
• Ability to work autonomously within project parameters.
• Ability to handle privileged access in a responsible manner.
• Ability to deal discreetly with confidential matters.
• Ability to handle routines and records with accuracy and orderliness.
• Commitment to core values of Excellence, Innovation, and Integrity.
Confidentiality Notice: This message and any attachments may contain confidential or privileged information and are only for the use of the intended recipient of this message. If you are not the intended recipient, please notify the sender by return e-mail, and delete or destroy this and all copies of this message and all attachments. Any unauthorized disclosure, use, distribution, or reproduction of this message or any attachments is prohibited and may be unlawful.