Cyber Security Engineer

Remote: 
Full Remote
Contract: 
Work from: 

Offer summary

Qualifications:

Minimum three years of experience in cyber threat or information security., Proficient in vulnerability scanning and assessment tools like Tenable Nessus., Familiar with compliance regulations such as SOX, PCI-DSS, and GLBA., Knowledge of security technologies including IDS/IPS, firewalls, and EDR..

Key responsibilities:

  • Respond to SOC alerts and perform analysis and containment of security events.
  • Support the Cyber Incident Response Team in detecting and analyzing attacks.
  • Operate configuration management and File Integrity Management programs.
  • Document incident response playbooks and produce operational metrics.

Southern Talent Specialists, Inc. logo
Southern Talent Specialists, Inc.

Job description

Cyber Security Engineer

Job Description:    The Cyber Security Engineer is responsible for second level security event/incident response along with the collection, analysis, and dissemination of cyber threat intelligence. These capabilities will include timely collection of advanced warning of impeding IT vulnerabilities or threats, a thorough correlation, analysis, and storage of threat intelligence information, and operational support of the incident response process. The candidate They will deliver and sustain the enterprise management strategy and solutions from a governance, process, discipline and technology standpoint, to support enterprise environments and our presence in various cloud instances and on-premises data centers covering threats / FIM / configuration management / incident response / vulnerability management. Secondary roles include IPS, EDR, TIP tools, and other information security solutions.

Essential Functions of the Job:
  • Responding to SOC alerts performing an analysis, and containment of security events.
  • Provide tier II support for escalated security incidents.
  • Support the Cyber Incident Response Team (CIRT) in the effective detection, analysis, and containment of attacks.
  • Operate the configuration management program to track configuration drift over time, working with asset custodians to correct any configuration deviation from baseline.
  • Operate the File Integrity Management program to track changes to file systems on critical systems.
  • Operate the processes necessary to collect threat intelligence, analyze the data for patterns and actionable information, and create intelligence products for other teams to consume using MITRE ATT&CK Framework.
  • Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents.
  • Integrate appropriate systems and logs into the global threat management platform or Security Event and Incident Management system to properly protect critical assets.
  • Design, test and develop specific content and alerting to identify threats against critical assets.
  • Document incident response playbooks for new threat content and alerts.
  • Maintain an understanding of attacks, vectors and emergent threats.
  • Obtain and share cyber security intelligence with security partners, vendors and law enforcement as necessary.
  • Produce weekly and monthly operational metrics.
  • Work with vendors and internal customers to respond to escalations.
  • Recommends Preventative Security Actions.
  • Recommends Corrective Security Actions.
Knowledge and Skills Requirements:
  • Three-year minimum working in cyber threat or information security.
  • Vulnerability Scanning & Assessment: Perform vulnerability scans using tools like Tenable Nessus, analyze results, and prioritize findings for remediation.
  • Configuration Assessment: Evaluate system configurations against industry standards (e.g., CIS benchmarks) and ensure compliance.
  • File Integrity Monitoring (FIM): Implement and maintain FIM solutions, analyze file changes, and investigate suspicious activities.
  • Familiar with compliance regulations such as SOX, PCI-DSS, GLBA, and Federal Banking regulations.
  • Proficient with cloud security and monitoring capabilities in Azure
  • Proficient with Incident Response in Azure
  • Proficient with configuration management scanning tools.
  • Knowledgeable with Tripwire or other file integrity management tools.
  • Excellent team skills and integrity in a professional environment.
  • Ability to Map threats and vulnerabilities to MITRE.
  • Familiar with STRIDE.
  • Familiar with the Open Systems Interconnection (OSI) model.
  • Understanding of security technologies: IDS/IPS, firewalls, AV, proxies, EDR.
  • Understanding of scripting languages like JavaScript, Perl, etc.
  • Understanding of cloud configuration and vulnerability scanning tools.
  • CISSP, GSEC, GCIH, CEH or other security certifications preferred, but not required.

 

Required profile

Experience

Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Analytical Skills
  • Teamwork
  • Personal Integrity

Cybersecurity Engineer Related jobs