Job Description
SUMMARY
Monitor security systems and events to assess, detect, analyze, and investigate threats. Work regularly to enhance current solutions to improve security posture. Communicate technical security requirements, install security measures, and recommend raising the level of security awareness. Participate in all cybersecurity incidents providing analysis and documentation.
Essential Duties And Responsibilities
Includes the following:
• Must be available 24x7 for cyber incident response support – we will find out more about this need but for now just make sure candidates understand they need to be flexible and will sometimes be on call.
• Fulfillment of responsibilities must be performed with little to no supervision
• Required to be in-office locations on a full-time basis
• Responsible for logging, tracking, documenting and resolving all cyber incidents in the designated solution
• Support security policies and standards
• Researches, evaluates and recommends new security services/solutions
• Develops, monitors and evaluates access control security standards.
• Designs and implements security controls designed to detect and protect against cyber-attacks and other persistent threats.
• Monitors and analyzes potential infrastructure security events to determine if event qualifies as a legitimate security incident.
• Investigates legitimate security incidents and submits findings following forensic guidelines to preserve evidence for potential legal action; recommends prevention solutions to IT security engineering and/or incident response.
• Performs regular network monitoring and intrusion detection analysis using various Computer Network Defense tools, such as Intrusion Detection/Prevention Systems, Firewalls, SIEM, NAC, and Vulnerability Management tools.
• Coordinates and performs penetration testing, vulnerability scanning and code reviews to identify and address security weakness and access control audits for systems and applications.
• Performs coordination and weekly updates to cybersecurity risks (risk register) including driving risks to closure with IT security engineering and other internal/external resources.
• Conducts correlation analysis across numerous internal and external data sources, identifying security incidents and supporting incident response activities.
• Assures all basic cybersecurity requests/incident tickets are closed in a timely manner and assigned changes, enhancements, and other ticket creation requests are submitted with all required data.
• Conducts interviews with end users involved with a security incident.
• Assists in conducting security testing, verification, and risk analysis of the company’s network and systems.
• Analyzes and reports patching status of OS and Applications and works directly with applicable teams for remediation.
• Assists in the creation and deployment of regular user training articles, phishing campaigns, and Cybersecurity Awareness campaigns.
• Collaborates with team to ensure all cybersecurity policies and procedures are regularly updated and maintained including upgrades to latest PCI and NIST standards.
• Participates in knowledge sharing to develop solutions efficiently.
• Provides project support as assigned
• Performs other job-related duties as assigned.
Supervisory / Management Authority
No supervisory/management authority.
Education And Experience
• Bachelor’s degree in computer science, information systems, or other related field, and 4 to 6 years of cybersecurity experience or an equivalent combination of education and experience. Four (4) years of information technology experience managing security solutions with a business network and Active Directory, mitigating viruses, malware, and spam, and/or reporting on vulnerability and risk via Qualys required. Certified Ethical Hacker (CEH) and/or Certified Information Systems Security Professional (CISSP) certifications preferred.
Knowledge, Skills And Abilities
Security Roadmap Developmen t:
• Define and develop a long-term cybersecurity strategy aligned with business objectives.
• Identify security gaps, risks, and future threats to create a prioritized security roadmap.
• Establish frameworks, policies, and best practices to enhance security posture.
Security Team Identification & Leadership:
• Assess current security team capabilities and identify skill gaps.
• Define roles and responsibilities for key security positions.
• Recruit, mentor, and build a high-performing cybersecurity team.
Technical Security Architecture & Implementation:
• Design and implement secure architecture for applications, networks, and cloud environments.
• Ensure compliance with industry standards (NIST, ISO 27001, CIS, etc.).
• Oversee security tool selection, deployment, and integration (SIEM, IAM, EDR, etc.).
Collaboration & Compliance:
• Work with IT, DevOps, and leadership to align security with business needs.
• Ensure regulatory compliance (GDPR, HIPAA, SOC 2, etc.).
• Communicate security risks and recommendations to executives and stakeholders.
Work Environment
• Work is primarily performed in a climate-controlled office-setting. Work may require travel, including overnight stays. Work will require varied shifts including, weekends and holidays, as needed (on call).
“Tekgence is an equal opportunity employer. Applicants must be authorized to work in the U.S. U.S. citizens and Green Card holders are strongly encouraged to apply”
...AND DEVELOPMENT BASIC Shampooing, Conditioning Treatments, Color application Blowdrying. ADVANCE Cutting, Styling, Curly Hair Specialist training and Keratin Treatments. MUST be available to attend hair shows, cutting classes and product knowledge...
...game studio, is seeking a proactive and highly organized Personal/Executive Assistant to support the founder/creative director. The ideal candidate... ..., errands, groceries, coordinating cleaners, booking travel, phone calls with trade workers, etc. Assist with miscellaneous...
...techniciens dexploitation dans leur monte en comptenceVous interviendrez sur des infrastructures varies dans votre domaine de comptence :Scurit : Fortinet, Stormshield, Palo Alto,Rseau : Cisco, Meraki, Extreme Networks, Aruba, Ucopia#J-18808-Ljbffr WeRecruit
...Inova Health *is looking for a dedicated *RN Unit Supervisor (Charge Nurse) *to join the... ...Hospital Safety Grades for excellence in healthcare. We are proud to be named one of... ...parental leave, flexible work schedules, and remote and hybrid career opportunities *Job Responsibilities...
...Job Description The Public Relations Manager (Manager) is a professional and compelling storyteller that is pivotal in promoting, enhancing, and protecting the brand story and reputations of our diverse clientele. Manager will help support our Houston and South Texas...