Negotiable
Undetermined
Remote
Remote
Summary: The Cybersecurity Engineer role involves developing and managing advanced cybersecurity solutions to support business operations. Candidates will work in a collaborative environment, requiring hands-on experience with various operating systems and security technologies. The position demands a proactive approach to security incident response and the ability to collaborate across teams to enhance security measures. A strong foundation in cybersecurity principles and a commitment to continuous learning are essential for success in this role.
Key Responsibilities:
- Research, evaluate, validate, and recommend technical security solutions while assisting with Build, Test, and Implementing for the enterprise and its subsidiaries.
- Coordinate with product vendors and service providers supporting technical security capabilities and processes.
- Manage system/application environment, configuration, policy, and required operational activities on assigned technical security solutions.
- Monitor, report on, and enhance performance of assigned technical security solutions.
- Provide security technology incident response and problem management; troubleshoot software and/or hardware issues/failures on assigned technical security solutions.
- Accountable for follow-up of all security work requests, collaborating with other IT areas to ensure timely completion/resolution.
- Support escalations, known issues, and out of cycle requests on multiple security solutions for the enterprise and its subsidiaries.
- Support the development and maintenance of operational documentation for technical security solutions.
- Collect, analyze, synthesize, and present data on technical security solutions and processes to peers, leadership, and business stakeholders.
- Assist the migration, upgrade, and disposal of complex security capabilities and evaluate risks and impacts.
- Collaborate with other business areas to deliver on work group initiatives for the enterprise and its subsidiaries.
- Assist with developing continuous testing and validation of product performance and gap analysis for continuous security hardening processes.
- Assist execution and alignment to security reference architecture standards and published blueprints.
- Assist Disaster Recovery planning, design, implementation, and exercises on security technology solutions.
- Assist remediation actions as a result of threat and vulnerability assessments or audits.
- Provide training to others on security capabilities, processes, procedures, and operational tasks.
Key Skills:
- Basic knowledge of TCP/IP networking preferred.
- Capacity to work independently and willingness to seek advice/assistance.
- Basic understanding of security concepts and controls for network, application, and operating systems.
- Ability to troubleshoot and investigate security-related issues and knowledge with vulnerability and patch management.
- Strong technical, analytical, and administrative skills.
- Strong corporate work ethics.
- Strong documentation and review skills.
- Strong problem-solving skills.
- Maintain a positive attitude.
- Excellent interpersonal and written communication skills.
- Passionate about technology and eager to learn new things quickly.
- Strong solutioning skills to help facilitate new technology gaps.
- Team player that recognizes the bigger picture and understands the value of teamwork.
- Display an ownership attitude and drive initiatives to completion.
Salary (Rate): £40,000 yearly
City: undetermined
Country: undetermined
Working Arrangements: remote
IR35 Status: undetermined
Seniority Level: undetermined
Industry: IT
Description:
- The Client Cybersecurity team develops and manages next generation solutions, systems and assets that support the business and its subsidiaries.
- Working in a collaborative, creative and fun environment, we offer technology professionals a wide range of opportunities to utilize and further develop their skills while helping people live healthier lives.
- Candidates will need to have fundamental hands-on experience with core infrastructure operating systems, host compliance, file integrity monitoring solutions, and advanced malware defensive technologies.
- Base knowledge of running IBM AIX, Red Hat Enterprise, MAC OSX and Windows Enterprise operating systems.
- Candidate will have experience with fast paced, incentivized business operations that need to be agile while adhering to diverse regulatory and security framework expectations.
Essential Functions:
- The essential functions listed represent the major duties of this role, additional duties may be assigned.
- Research, evaluation, validation and recommendation of technical security solutions while assisting with Build, Test, and Implementing for the enterprise and its subsidiaries
- Coordinates with product vendors and service providers supporting technical security capabilities and processes
- Manage system/application environment, configuration, policy and required operational activities on assigned technical security solutions
- Monitors, reports on, and enhances performance of assigned technical security solutions
- Provides security technology incident response and problem management. Troubleshoots software and/or hardware issues/failures on assigned technical security solutions. Resolves alerts and performs remediation activities as required for return-to-operation.
- Accountable for follow-up of all security work requests including collaborating with other IT areas to ensure timely completion/resolution and obtainment of appropriate approval levels.
- Supports escalations, known issues and out of cycle requests on multiple security solutions for the enterprise and its subsidiaries
- Supports the development and maintenance of operational documentation for technical security solutions (e.g. procedures, engineering diagrams, knowledgebase, etc.).
- Collects, analyzes, synthesizes and presents data on technical security solutions and processes to peers, leadership and business stakeholders
- Assists the migration, upgrade and disposal of complex security capabilities and evaluates risks and impacts
- Collaborates with other business areas to deliver on work group initiatives for the enterprise and its subsidiaries
- Assists with developing continuous testing and validation of product performance and gap analysis for continuous security hardening processes
- Assists execution and alignment to security reference architecture standards and published blueprints.
- Assists Disaster Recovery planning, design, implementation and exercises on security technology solutions
- Assists remediation actions as a result of threat and vulnerability assessments or audits
- Provide training to others on security capabilities, processes, procedures and operational task
Additional Required Qualifications:
- Basic knowledge of TCP/IP networking preferred
- Capacity to work independently and willingness to seek advice/assistance.
- Basic understanding of security concepts and controls for network, application, and operating systems.
- Ability to troubleshoot and investigate security related issues and having experience or knowledge with vulnerability and patch management.
- Strong technical, analytical, and administrative skills.
- Strong corporate work ethics.
- Strong Documentation and Review Skills to ensure "We say what we do and do what we say "
- Have strong problem-solving skills.
- Maintain a positive attitude.
- Are professionals and possess excellent interpersonal and written communication skills.
- Are passionate about technology.
- Have the desire and ability to learn new things fast.
- Strong Solutioning Skills to help facilitate new technology gaps
- Want to be part of an efficient and effective team.
- Display an ownership attitude and drive initiatives to completion.
- Are a team player that recognizes the bigger picture and understands the value of teamwork.
Required Work Experience:
- 4+ years related work experience
- 2+ years in Cybersecurity
- 2+ years Information Technology Infrastructure
Required Education:
- Related Bachelor's degree or additional related equivalent work experience
Required Licenses and Certifications (required within 180 days of FT hire) :
- Cybersecurity Engineer Defense and Threat Operations: SSCP
- Cybersecurity Engineer Enterprise Cybersecurity Services: SSCP
- **In alignment with GW Cybersecurity requirements, contractors must posses a relevant cybersecurity or technical certification for this role. If a relevant certification is not possessed, the contractor will be expected to obtain a relevant certification within 6 months of hire. (Relevant certification will be defined by hiring manager)
Additional Preferred Qualifications:
- Exposure to Project Management methodologies like Waterfall, Agile, Lean or SAFe methodologies