Overview
On Site
$Competitive
Accepts corp to corp applications
Contract - Independent
Contract - W2
Skills
Cyber Security
Firewall
Intrusion Detection
Endpoint Protection
Security Controls
Regulatory Compliance
Hardening
Mentorship
Identity Management
Management
EPM
CyberArk
Scripting
Python
Windows PowerShell
Bash
SQL
Workflow
API
Reporting
Cloud Computing
Cloud Security
Microsoft Azure
Amazon Web Services
SIEM
Job Details
Job Description:
The cybersecurity engineer is responsible for implementing security controls by designing, configuring, and deploying security technologies.
Develops solutions to protect networks, systems, and applications by evaluating and applying security tools.
Provides expertise in configuring firewalls, intrusion detection and prevention systems, endpoint protection, and identity access management solutions.
Conducts vulnerability assessments and penetration tests to evaluate the effectiveness of security controls as configured and deployed.
Maintains compliance with internal standards and regulatory requirements.
Collaborates with IT and business teams to integrate security into applications and infrastructure.
Enhances team capability by hardening systems, documenting processes, automating tasks, and mentoring peers on secure engineering practices.
The cybersecurity engineer is responsible for implementing security controls by designing, configuring, and deploying security technologies.
Develops solutions to protect networks, systems, and applications by evaluating and applying security tools.
Provides expertise in configuring firewalls, intrusion detection and prevention systems, endpoint protection, and identity access management solutions.
Conducts vulnerability assessments and penetration tests to evaluate the effectiveness of security controls as configured and deployed.
Maintains compliance with internal standards and regulatory requirements.
Collaborates with IT and business teams to integrate security into applications and infrastructure.
Enhances team capability by hardening systems, documenting processes, automating tasks, and mentoring peers on secure engineering practices.
Skills needed:
Identity & Privileged Access Management (Required)
Expertise with deployment and configuration of Privileged Management (PAM) tools (CyberArk, BeyondTrust).
Expertise with configuration of IAM across Okta, Azure AD/Entra ID, and AWS IAM.
Expertise with deployment and configuration of Endpoint Privilege Management (EPM) tools (CyberArk) Automation & Scripting (preferred)
Python, PowerShell, Bash, and SQL for automation and remediation.
SOAR workflow authoring
Use of REST-based API calls to integrate disparate tooling into reporting/SOAR functions Cloud & Infrastructure Security (preferred)
Securing Azure and AWS environments.
Use of native cloud security tools (Azure Security Center, AWS GuardDuty, etc.).
Integration of additional security tooling and integration with SIEM solutions
Identity & Privileged Access Management (Required)
Expertise with deployment and configuration of Privileged Management (PAM) tools (CyberArk, BeyondTrust).
Expertise with configuration of IAM across Okta, Azure AD/Entra ID, and AWS IAM.
Expertise with deployment and configuration of Endpoint Privilege Management (EPM) tools (CyberArk) Automation & Scripting (preferred)
Python, PowerShell, Bash, and SQL for automation and remediation.
SOAR workflow authoring
Use of REST-based API calls to integrate disparate tooling into reporting/SOAR functions Cloud & Infrastructure Security (preferred)
Securing Azure and AWS environments.
Use of native cloud security tools (Azure Security Center, AWS GuardDuty, etc.).
Integration of additional security tooling and integration with SIEM solutions
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.