Cybersecurity Threat Response

Overview

On Site
$120,000 - $185,000 annually
Full Time

Skills

Customer Facing
Security Operations
Workflow
Customer Support
Documentation
Investor Relations
International Relations
Information Retrieval
KPI
Dashboard
Collaboration
Process Improvement
Computer Science
Cyber Security
Threat Analysis
SIEM
Endpoint Protection
Cloud Computing
Amazon Web Services
Microsoft Azure
Google Cloud
Google Cloud Platform
Management
Web Security
Incident Management
Root Cause Analysis
Problem Solving
Conflict Resolution
Communication
Security Architecture
GSEC
GCIA
GCFA
CISA
CISSP
CISM
DevOps
Network Engineering
Scripting
Artificial Intelligence
Messaging

Job Details

RESPONSIBILITIES:
Kforce's client in Alpharetta, GA is on the hunt for a Senior Cybersecurity Engineer who's equal parts sleuth and strategist.

Summary:
In this role, you'll dive deep into customer-facing security incidents, hunt emerging threats, and strengthen our detection and response posture. This isn't just about watching alerts roll in - it's about proactive protection, fast action, and keeping customer trust intact. As a Senior Cybersecurity Engineer, you will work across internal teams and external partners to resolve threats quickly and efficiently, building better tools, smarter processes, and a stronger security culture as you go.

Responsibilities:
Security Operations & Threat Detection:
* Analyze and triage alerts using tools like SIEM, EDR, and threat intel platforms
* Lead investigations for phishing, data breaches, ATOs, and suspicious user behavior
* Conduct threat hunting to uncover malicious activity before it becomes a problem
* Improve and maintain investigation playbooks and detection workflows
* Collaborate with our MSSP and internal teams to evolve our detection capabilities
* Partner with customer support and product teams on security concerns and findings
* Assist in shaping security policies and detection logic

Incident Response & Investigation:
* Handle customer-impacting incidents like DDoS attacks and data exposures
* Investigate threat actor behavior and emerging tactics (TTPs)
* Correlate data and perform root cause analysis to guide remediation efforts
* Create clear documentation for internal teams and external communication
* Continuously evolve IR plans and tools for a faster, more effective response

Security Projects & Strategy:
* Build KPIs, dashboards, and reports to measure response effectiveness
* Collaborate on detection engineering projects tailored to customer environments
* Recommend security tooling and process improvements based on threat insights

REQUIREMENTS:
* Bachelor's in Computer Science (or related field) + 4+ years of hands-on cybersecurity experience
* Deep knowledge of threat intel, SIEM, endpoint protection, SOAR, and WAFs
* Experience across cloud platforms (AWS required; Azure and/or Google Cloud Platform a plus)
* Hands-on understanding of DDoS mitigation, bot management, and web security
* Strong knowledge of incident response, root cause analysis, and forensic practices
* Excellent problem-solving and communication skills - you can talk security with anyone
* Familiarity with Zero Trust principles and modern security architecture
* Able to work with MSSPs and internal teams across technical and business areas

Nice to Have:
* Security certifications like GSEC, GCIA, GCFA, CISA, CISSP, or CISM
* Background in DevOps, systems, or network engineering
* Scripting or querying skills for analysis and automation

The pay range is the lowest to highest compensation we reasonably in good faith believe we would pay at posting for this role. We may ultimately pay more or less than this range. Employee pay is based on factors like relevant education, qualifications, certifications, experience, skills, seniority, location, performance, union contract and business needs. This range may be modified in the future.

We offer comprehensive benefits including medical/dental/vision insurance, HSA, FSA, 401(k), and life, disability & ADD insurance to eligible employees. Salaried personnel receive paid time off. Hourly employees are not eligible for paid time off unless required by law. Hourly employees on a Service Contract Act project are eligible for paid sick leave.

Note: Pay is not considered compensation until it is earned, vested and determinable. The amount and availability of any compensation remains in Kforce's sole discretion unless and until paid and may be modified in its discretion consistent with the law.

This job is not eligible for bonuses, incentives or commissions.

Kforce is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.

By clicking ?Apply Today? you agree to receive calls, AI-generated calls, text messages or emails from Kforce and its affiliates, and service providers. Note that if you choose to communicate with Kforce via text messaging the frequency may vary, and message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You will always have the right to cease communicating via text by using key words such as STOP.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

About Kforce Technology Staffing