Overview
Remote
On Site
$72.00 - $82.18 hourly
Contract - W2
Contract - Temp
Skills
Leadership
Presentations
Network
Forensics
System On A Chip
Collaboration
Regulatory Compliance
Legal
Training
Mentorship
GCIH
GCFA
CISSP
CompTIA
Cyber Security
Digital Forensics
Scripting
Python
Rust
Windows PowerShell
Bash
Communication
Workflow
ServiceNow
Microsoft Certified Professional
Large Language Models (LLMs)
Security Operations
Cloud Computing
Amazon Web Services
Microsoft Azure
Google Cloud
Google Cloud Platform
Continuous Integration
Continuous Delivery
Network Security
DLP
Microsoft
SIEM
Splunk
Incident Management
SANS
D3.js
OWASP
Analytical Skill
Problem Solving
Conflict Resolution
ROOT
Adaptability
Management
Research
Publications
Open Source
Artificial Intelligence
Messaging
Job Details
RESPONSIBILITIES:
A client with Kforce is seeking a IT Security Engineer IV to join their team. This is a West Coast remote position.
Duties:
* Respond to escalated security events and investigations, coordinating communications and executing the Incident Response Plan as needed
* Lead and provide support for critical security incidents, delivering timely and clear status updates to stakeholders
* Provide clear and concise communications in collaborative environments, stakeholder verbal reports, and senior leadership presentations
* Perform comprehensive host, network, and cloud forensic analysis to determine the root cause, scope, and impact of security incidents while preserving evidence
* Analyze and correlate signals from SIEM, EDR, and other platform logs to validate and triage threats
* Develop, maintain, and continuously improve incident response playbooks and runbooks to ensure prompt and compliant actions
* Design and implement automated security workflows and response actions using platforms such as Workato and ServiceNow
* Partner with Detection Engineering to create and tune detections based on lessons learned from incidents
* Support and enhance security for AWS infrastructure through MCP (Model Context Protocol) server engineering
* Research and apply AI, Large Language Models, and agentic SOC concepts to enhance threat detection, security operations, and incident response
* Collaborate with Compliance, Legal, and Risk teams to ensure incident response workflows align with business and regulatory requirements
* Assess vulnerabilities, propose effective remediation strategies, and stay current on emerging security threats and countermeasures
* Provide training and guidance on security best practices to organizational partners and mentor other incident responders
* Contribute to post-incident reviews and the development of metrics to drive continuous program improvement
REQUIREMENTS:
* Bachelor's degree in Computer Science, Cybersecurity, or a related field is preferred
* Industry certifications such as GCIH, GCFA, AWS Security Specialty, CISSP, or CompTIA CySA+ are advantageous
* 4+ years of experience in a dedicated cybersecurity role, with a strong emphasis on incident response and digital forensics specialization
* 2+ years of experience with programming and scripting languages such as Python, Rust, PowerShell, and bash
* Exceptional written and verbal communication skills, with the ability to explain technical concepts to non-technical audiences
* Proven experience in developing automation and workflows, particularly with platforms like Workato and ServiceNow
* Experience with MCP server engineering for AWS infrastructure
* Proficient understanding of AI technologies, Large Language Models, and their application in security operations
* Experience using and defending public cloud services such as AWS, Azure, and Google Cloud Platform (IAM, CI/CD Pipelines, Network Security, DLP)
* Experience performing analysis using EDR or CSPM tools (e.g., CrowdStrike Falcon, Microsoft Defender, Wiz) and SIEM solutions (e.g., Splunk, LogScale)
* Deep knowledge of the Security Incident Response Lifecycle (e.g., NIST, SANS) and security fundamentals, including frameworks like MITRE ATT&CK/D3FEND, OWASP, and CIS
* Strong analytical and problem-solving skills with the ability to identify root causes and assess risk
* Self-motivated and adaptable, with the ability to work autonomously and manage tasks effectively under pressure
Nice to Have:
* Active involvement in the security community, such as research, publications, or open-source contributions
The pay range is the lowest to highest compensation we reasonably in good faith believe we would pay at posting for this role. We may ultimately pay more or less than this range. Employee pay is based on factors like relevant education, qualifications, certifications, experience, skills, seniority, location, performance, union contract and business needs. This range may be modified in the future.
We offer comprehensive benefits including medical/dental/vision insurance, HSA, FSA, 401(k), and life, disability & ADD insurance to eligible employees. Salaried personnel receive paid time off. Hourly employees are not eligible for paid time off unless required by law. Hourly employees on a Service Contract Act project are eligible for paid sick leave.
Note: Pay is not considered compensation until it is earned, vested and determinable. The amount and availability of any compensation remains in Kforce's sole discretion unless and until paid and may be modified in its discretion consistent with the law.
This job is not eligible for bonuses, incentives or commissions.
Kforce is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
By clicking ?Apply Today? you agree to receive calls, AI-generated calls, text messages or emails from Kforce and its affiliates, and service providers. Note that if you choose to communicate with Kforce via text messaging the frequency may vary, and message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You will always have the right to cease communicating via text by using key words such as STOP.
A client with Kforce is seeking a IT Security Engineer IV to join their team. This is a West Coast remote position.
Duties:
* Respond to escalated security events and investigations, coordinating communications and executing the Incident Response Plan as needed
* Lead and provide support for critical security incidents, delivering timely and clear status updates to stakeholders
* Provide clear and concise communications in collaborative environments, stakeholder verbal reports, and senior leadership presentations
* Perform comprehensive host, network, and cloud forensic analysis to determine the root cause, scope, and impact of security incidents while preserving evidence
* Analyze and correlate signals from SIEM, EDR, and other platform logs to validate and triage threats
* Develop, maintain, and continuously improve incident response playbooks and runbooks to ensure prompt and compliant actions
* Design and implement automated security workflows and response actions using platforms such as Workato and ServiceNow
* Partner with Detection Engineering to create and tune detections based on lessons learned from incidents
* Support and enhance security for AWS infrastructure through MCP (Model Context Protocol) server engineering
* Research and apply AI, Large Language Models, and agentic SOC concepts to enhance threat detection, security operations, and incident response
* Collaborate with Compliance, Legal, and Risk teams to ensure incident response workflows align with business and regulatory requirements
* Assess vulnerabilities, propose effective remediation strategies, and stay current on emerging security threats and countermeasures
* Provide training and guidance on security best practices to organizational partners and mentor other incident responders
* Contribute to post-incident reviews and the development of metrics to drive continuous program improvement
REQUIREMENTS:
* Bachelor's degree in Computer Science, Cybersecurity, or a related field is preferred
* Industry certifications such as GCIH, GCFA, AWS Security Specialty, CISSP, or CompTIA CySA+ are advantageous
* 4+ years of experience in a dedicated cybersecurity role, with a strong emphasis on incident response and digital forensics specialization
* 2+ years of experience with programming and scripting languages such as Python, Rust, PowerShell, and bash
* Exceptional written and verbal communication skills, with the ability to explain technical concepts to non-technical audiences
* Proven experience in developing automation and workflows, particularly with platforms like Workato and ServiceNow
* Experience with MCP server engineering for AWS infrastructure
* Proficient understanding of AI technologies, Large Language Models, and their application in security operations
* Experience using and defending public cloud services such as AWS, Azure, and Google Cloud Platform (IAM, CI/CD Pipelines, Network Security, DLP)
* Experience performing analysis using EDR or CSPM tools (e.g., CrowdStrike Falcon, Microsoft Defender, Wiz) and SIEM solutions (e.g., Splunk, LogScale)
* Deep knowledge of the Security Incident Response Lifecycle (e.g., NIST, SANS) and security fundamentals, including frameworks like MITRE ATT&CK/D3FEND, OWASP, and CIS
* Strong analytical and problem-solving skills with the ability to identify root causes and assess risk
* Self-motivated and adaptable, with the ability to work autonomously and manage tasks effectively under pressure
Nice to Have:
* Active involvement in the security community, such as research, publications, or open-source contributions
The pay range is the lowest to highest compensation we reasonably in good faith believe we would pay at posting for this role. We may ultimately pay more or less than this range. Employee pay is based on factors like relevant education, qualifications, certifications, experience, skills, seniority, location, performance, union contract and business needs. This range may be modified in the future.
We offer comprehensive benefits including medical/dental/vision insurance, HSA, FSA, 401(k), and life, disability & ADD insurance to eligible employees. Salaried personnel receive paid time off. Hourly employees are not eligible for paid time off unless required by law. Hourly employees on a Service Contract Act project are eligible for paid sick leave.
Note: Pay is not considered compensation until it is earned, vested and determinable. The amount and availability of any compensation remains in Kforce's sole discretion unless and until paid and may be modified in its discretion consistent with the law.
This job is not eligible for bonuses, incentives or commissions.
Kforce is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
By clicking ?Apply Today? you agree to receive calls, AI-generated calls, text messages or emails from Kforce and its affiliates, and service providers. Note that if you choose to communicate with Kforce via text messaging the frequency may vary, and message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You will always have the right to cease communicating via text by using key words such as STOP.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.