Job Summary:
The Cyber Security Engineer II position is responsible for the development and implementation of solutions to defend and protect the client's computer systems, information, and networks from intentional or unintentional access, modification, or destruction. This position is responsible for designing, assessing, project planning, documenting, implementation, and ensure the support of cyber security solutions for the client. This position needs to intently focus on prioritization and always seek improvement of processes and tools. A successful Cyber Security Engineer II will have a multidisciplinary background beyond cyber security, in fields such as client and server systems, networking, and application development. This position must thrive in fast-paced, high-stress situations and is heavily reliant on teamwork.
Major functions for this position:
Lead the implementation of technology solutions, as part of a delivery team. – 75% of total job
- Lead, plan, design, and implement solution designs at a high-quality level in waterfall or agile projects with other IT staff.
- Maximize automation of processes for provisioning, maintenance and monitoring of solutions designed for minimal impact to operations teams.
- Consult with users and technical staff to evaluate requirements, recommend designs, provide cost analysis, plan projects and coordinate tasks for installation of cyber security solutions and to ensure industry best practices, standards, and any cyber security and compliance requirements.
- Provide procedural and support documentation for transition of solutions to operations and/or end users.
- Perform administrative tasks as required by policy, procedures, or processes.
- Fulfill the Technical Lead role in the project processes.
Provide operational support of escalated issues. – 20% of total job
- Troubleshoot, analyze, and resolve complex cyber security issues and cyber security risks.
- Resolve problems and communicate solution to customers.
- Provide guidance and leadership to the Cyber Security Engineering team and the CSOC.
- Provide high-level technical support and assistance to the CSOC in the resolution of complex issues. Act as a point of escalation.
- Liaison with vendors, business partners and customers to ensure timely resolution of issues.
Research and recommend technology standards. – 5% of total job
- Research and stay well-informed on cyber security best practices for configurations and cyber security standards.
- Work with other Engineering teams to develop hardening/cyber security guidelines.
- Participate in the evaluation of system and network cyber security and policy configurations and recommend changes as necessary to the Engineering group
Position Specifications
Required:
- Minimum of 4 years of progressive experience with cyber security technology design and administration in large, complex environments, particularly in multi-region retail.
- Experience in cryptography, network defense, endpoint protection, forensics, data protection, and incident response.
- Understanding of data center technologies and concepts including services, cyber security, infrastructure design, disaster recovery practices.
- Experience troubleshooting of IT systems.
- Experience with compliance standards such as HIPAA, PCI, and SOX.
- Experience with next generation firewalls, IDS/IPS, network access control, email and web cyber security, digital forensics, endpoint detection and response, vulnerability scanning, data protection, credential vaulting, certificate management, Multi-Factor, access brokering, SIEM, public cloud compliance and cyber security automation and orchestration technologies.
- Experience in planning and tracking the execution of projects. The ability to communicate effectively to both business and IT staff in a professional manner.
Desired:
- Experience in all aspects of cyber security technologies and knowledge in supporting and building large, complex cyber security environments.
- Experience planning and implementing a technical backlog to drive continuous improvement of technology and practices.
- Working experience with Active Directory and Microsoft and/or Linux OS, networking, identity and access management, wireless networking and cyber security, penetration testing, incident response, and application cyber security methodologies.
- Understanding of encryption systems and methodology.
- Experience in scripting or software development.