What are the responsibilities and job description for the Cyber Security Engineer position at Resource 1 LLC?
Cyber Security Engineer
New York, NY
Requirements
- 5-7 years' experience in Information Systems customer support and/or desktop engineering
- 5 years of relevant cybersecurity operations and/or engineering experience required.
- Bachelor's or master's degree in computer science, information systems, cybersecurity or a related field.
- Full working knowledge of entire Microsoft 365 suite
- Microsoft 365 administration (Teams, Exchange, SharePoint, OneDrive)
- Scripting and automation experience (e.g., PowerShell, VB, etc.)
- Solid understanding of PowerShell Modules for Exchange Online/On-Prem, SharePoint, Teams, OneDrive, Azure Active Directory, Active Directory, and Windows (Client/Server).
- Direct, hands-on experience or strong working knowledge of managing security infrastructure e.g., firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), endpoint protection, SIEM and log management technology.
- Direct, hands-on experience or a strong working knowledge of vulnerability management tools.
- Direct hands-on experience with enterprise cybersecurity product type: Secure Email Gateway (Mimecast, Proofpoint, or Office365 Exchange) (required).
- Documented experience and a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services.
- Experience securing the deployment of applications and infrastructure into public cloud services.
- Full-stack knowledge of IT infrastructure:
- Applications
- Databases Azure Managed Instances
- Operating systems - Windows, Linux, MAC
- Hypervisors
- IP networks - WAN and LAN
- Backup networks and media
- Containers/Kubernetes
- Direct experience designing IAM technologies and services:
- Active Directory
- Lightweight Directory Access Protocol (LDAP)
- IAM, Okta, Ping, Azure AD/MS, etc
- Strong working knowledge of IT service management (e.g., ITIL-related disciplines):
- Change management
- Configuration management
- Asset management
- Incident management
- Problem management