Overview
Skills
Job Details
Title: Jr Cyber Security Engineer
Duration: 12 Months with possible extension/hire
Work Arrangement: Hybrid (1-2 days per week in office)
Location: Carrollton, TX 75010
Anticipated Start Date: ASAP, 2nd week of August
Work Schedule: Hours: 8:00 AM - 5:00 PM
Role Overview
As a Cyber Security Operations Engineer II, you will be instrumental in advancing our organization's cybersecurity initiatives. Your role will focus on executing sophisticated cybersecurity operations and incident response strategies to protect our systems and networks from advanced threats. You will collaborate with cross-functional teams, providing expert guidance to junior analysts and other departments.
Primary Duties and Responsibilities:
- Operate enterprise security services, including continuous cybersecurity operations, incident response, cyber monitoring, threat hunting, and digital forensics.
- Utilize security tools to analyze suspicious events, identify root causes, provide regular updates, and recommend enhancements to existing systems and procedures.
- Conduct proactive and reactive threat hunting to analyze cyber threats.
- Ensure security controls are developed, managed, and maintained effectively.
- Support incident response efforts to mitigate security incidents.
- Perform business impact analysis to ensure resources are adequately protected with appropriate security measures.
- Assess threats to information assets and recommend suitable security controls.
- Mentor junior analysts in security event monitoring to identify potential violations, such as breaches or unauthorized activities.
- Participate in an on-call rotation, including weekends, to ensure continuous operations.
- Engage in internal incident response exercises and drills to maintain preparedness.
Experience, Skills, and Educational Requirements
Must Have
- Education: Degree in Cybersecurity, Risk Analysis, Computer Science, Information Systems, or equivalent work experience.
- Experience: 2-4 years of combined IT and cybersecurity work experience.
- Technical Skills: Hands-on experience with cybersecurity investigations using tools such as SIEM, EDR, and Email Security Gateway, with a primary focus on CrowdStrike Falcon XDR.
- Knowledge: Understanding of cybersecurity frameworks (e.g., MITRE ATT&CK, D3FEND, NIST, Cyber Kill Chain).
- Communication: Strong written communication skills, capable of translating complex technical issues into simple, clear concepts in English.
- Incident Response: Experience supporting major incident response activities and detection/response for EDR tools.
Nice to Have:
- Languages: Fluency in additional languages (e.g., Turkish, Spanish, French, Lithuanian).
- Certifications: Security certifications such as CompTIA Security+, CompTIA CySA+, EC-Council CEH, or equivalent.
- Expertise: Proficiency in Digital Forensics or Threat Hunting.
- Scripting: Experience with Python, PowerShell, Bash, or other scripting languages.
- Development: Prior experience in developing detection rules and SOAR playbooks.