Job Description
Information Cybersecurity Engineer (499875)
Atlanta GA (Hybrid)
Contract-2-Hire
Job Purpose
- Requires extensive knowledge of computer operating systems, networks, log analysis and security tools.
- Applies engineering principles to cybersecurity challenges.
- Necessary skill areas: fundamentals of computer science, information analysis, testing software, log analysis, event correlation, anomaly detection, and behavioural analysis.
- Defining cybersecurity controls for different systems and networks.
- Creates novel cyber security technology components to ensure that critical systems/information are resilient to cyber exploits and attacks.
- Performs attendant vulnerability assessments, analysis, and software engineering and design.
- Ensures cybersecurity needs established and maintained for operations, security requirements definition, security risk assessment, information systems analysis, information systems design, information systems hardening, configuration and maintenance of other security boundary devices (IDS/IPS, Firewalls, perimeter routing) and vulnerability scanning, incident response, disaster recovery, and operations continuity planning and provides analytical support for security policy development and analysis.
- Engineers, implements, and maintains Information Technology Infrastructure and associated cybersecurity controls.
- Areas of responsibility include but are not limited to information security operations, cyber risk & intelligence, data loss & fraud protection, regulatory compliance, policy management and audits & assessment.
Key Responsibilities
- Helps with the validation security control configuration on systems, ensure all systems are configured to necessary controls, such as NIST, DFARS , CMMC, and other similar requirements.
- Performs day to day analysis of security threats.
- Performs day to day remediation of security incidents.
- Provide leadership to lower-level cybersecurity and IT professionals across the enterprise.
Additional Responsibilities
- Assuring implementation of technical solutions supportive of institution information and Cybersecurity systems while identifying potential threatening behaviours through analysis of user compliance.
- Supporting information security operations, Cyber risk & intelligence, data loss and fraud protection, regulatory compliance, policy management and audits and assessment.
- Able to perform root cause analysis to identify and incorporate opportunities for continuous process improvement and future risk mitigation efforts, will be able to comprehend functionality of multiple technical tools and develop understanding of collection techniques and methodologies, recommend and develop requirements, specifications, design and procedures to satisfy security policy and planning and understand and author analytical reports identifying technical and behavioural analysis identified through independent reviews using multiple technology solutions.
- Ensures Cybersecurity needs are established and maintained for operations, security requirements, security risk assessment, information systems analysis, information systems design, information systems hardening, configuration and maintenance of other security boundary devices and vulnerability scanning, incident response, disaster recover, and operations continuity planning.
- Able to provide analytical support for security policy development and analysis identifying countermeasures associated with responsibilities.
- Engineer, implement, and maintain information technology solutions and associated Cybersecurity controls directly supporting the Insider Threat Program.
- Directly support the Insider Threat Program and focus on operational collection methods while performing studies through analysis and provide decision support for potential program enhancements in direct support of guidance derived from contractual requirements outlined in 32 CFR Part 117, National Industrial Security Program Operating Manual (NISPOM), Executive Order (E.O.) 13587, and the National Insider Threat Task Force (NITTF) Maturity Guidelines.
- Through the analytical and behavioural analysis collected through technological solutions, initiate response actions supporting daily operations and compliance to Cybersecurity policies.
- Provides technical assistance to include the support of unclassified networks and additional duties as required.
Required Minimum Qualifications
- Solid technical understanding of cybersecurity concepts, standards, guidelines, and principles.
- Experience with open-source intelligence (OSINT) tools and data sources in the execution of insider threat inquiries and investigations.
- Experience using one or more Security Information and Event Management (SIEM) tools.
- Experience using one or more endpoint detection and response (EDR) tools.
- Experience using one or more Cybersecurity Asset Management (CSAM) tools.
- Experience using one or more insider threat tools.
- Ability to complete identified Insider Threat Program training requirements prior to obtaining access to Insider Threat Program information.
- Strong written and oral communication skills.
- One or more intermediate cybersecurity certifications such as: Certified Ethical Hacker (CEH), PenTest+, Certified Threat Intelligence Analyst (CTIA), GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Enterprise Defender (GCED), GIAC Certified Forensic Analyst (GCFA), GIAC Certified Incident Handler (GCIH) or equivalent.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job
- Dice Id: 10116268
- Position Id: 8374754
Job Tags
Contract work,