Search

Cyber Security Engineer III

Sueki Solutions
locationElkhart, IN, USA
PublishedPublished: 6/14/2022
Technology
Full Time

Job Description

Job DescriptionWhy we’re different:We are actively involved in the community and care for the wellbeing of our team members. We understand the importance of work/lifebalance while offering hybrid schedules for flexibility and productivity.

Summary:

Responsible for responding to cybersecurity incidents, oversees the remediation of& system& vulnerabilities,& manages& cyber& security& toolsets,& and& aligns& systems& to the& organization’s security standards and compliance requirements.& Relationships:

  • Directly& report& to& the& Head& of& Cyber& Security.
  • Direct& interactions& to& work& with& and& support& the& internal& IT& team.
  • Direct interaction with employees from various departments, including& supervisors& and managers.
  • Direct interaction with security vendors and regulatory entities.

Responsibilities:

  • Performs all tasks safely, complies with all internal and external safety requirements, supports safety culture, attends all safety trainings and completes all compliance trainings as required by the client .
  • Uphold the client’s core values: Customer Service, Respect, Excellence, Stewardship and Teamwork (CREST).
  • Monitors for Security Anomalies, Violations of policies, and other& Security& Breaches.
  • Responds to Security related incidents and events in an organized and efficient manner,& providing& well-documented reports.
  • Leads a Vulnerability management program, working with other IT staff& to& guide& patching and& remediation.
  • Performs testing and verification of company security controls, provides& organized& reporting& based& on& findings.
  • Management of security tools such as firewalls, vulnerability scanners, SIEM,& asset& discovery& tools,& antivirus& toolset,& and& email& protection& toolsets.
  • Assisting& in& aligning& systems& to& organization-wide& security& policies/protocols.
  • Collaborates with internal and external stakeholders, such as auditors and regulatory bodies, to ensure compliance with relevant security standards, compliance, and regulations.&
  • Stays up to date with the latest cybersecurity threats, vulnerabilities, and industry best practices.
  • Contribute& to& security& recommendations& to& Network/System& Designs.
  • Participates& in& the security On-call rotation.
  • Other& duties& as& assigned.
  • Regular, reliable attendance.

Qualifications:

  • Bachelor’s& degree& in& computer& science& or& equivalent work experience.
  • Work experience& in& information& security.
  • Knowledge& of& penetration& testing,& network& security,& and& the& techniques& used& to& expose& and& correct& security& flaws
  • A& broad& understanding& of& security& technologies& including& firewalls,& proxies,& Security Information and Event Management (SIEM),& antivirus& software,& and& Identity Providers (IdPs)
  • Understanding of vulnerability management and the& ability& to& identify& and& spotlight& vulnerabilities& on& on-premises& and& remote& networks,& correct& problems,& and& prevent security breaches
  • Ability to prioritize and create remediation guidelines for system vulnerabilities.
  • The ability to think critically and innovatively about security solutions that can keep data safe while maintaining and high level of availability for business systems.&
  • Ability to communicate effectively, both verbally and written, with customers, co-workers, and business contacts in& a courteous& and& professional manner
  • Must& possess& and& maintain& a& valid& driver’s& license
  • Ability& to& perform& work& independently& with& minimal& guidance& and& supervision
  • Demonstrated& history.

MUST HAVE:

  • Bachelor’s& degree& in& computer& science& or& equivalent work experience.
  • Work experience& in& information& security.
  • Knowledge& of& penetration& testing,& network& security,& and& the& techniques& used& to& expose& and& correct& security& flaws.
  • A& broad& understanding& of& security& technologies& including& firewalls,& proxies,& Security Information and Event Management (SIEM),& antivirus& software,& and& Identity Providers (IdPs)
  • Understanding of vulnerability management and the& ability& to& identify& and& spotlight& vulnerabilities& on& on-premises& and& remote& networks,& correct& problems,& and& prevent security breaches
  • Must& possess& and& maintain& a& valid& driver’s& license.
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...