Skip to content

ComputerWork: Jobs for Technical People

 

Job Application

 
 
 

Please answer the following questions in order to process your application.

 
 
Email Address *
 
I certify that I am a U.S. citizen, permanent resident, or a foreign national with authorization to work in the United States. *
 
 
 
File Attachments:
(2MB file maximum. doc, docx, pdf, rtf or txt files only)
 
Attach a Resume * 
 
Optional covering letter 
OR
Clear covering letter
 
 
 * denotes required field
 
 
 
Additional Information:
 
First Name
 
Last Name
 
Address
 
Country
 
Home Telephone
 
Mobile/Cell
 
Availability/Notice
 
Salary Expectation USD
 
Approximately how far are you willing to travel to work (in miles) ?
 
 
 

Key Privacy Information

When you apply for a job, ComputerWork will collect the information you provide in the application and disclose it to the advertiser of the job.

If the advertiser wishes to contact you they have agreed to use your information following data protection law.

ComputerWork will keep a copy of the application for 90 days.

More information about our Privacy Policy.

 
 

Job Details

 

Cyber Security Engineer - vulnerabilities, IAM, Windows, Unix (Full Time)

Location: Austin Texas Country: United States of America Rate: 150K + Bonus
 

Cyber Security Engineer

The preference is Austin, TX with Chicago as an option.

The salary range is $150k maybe $160k max

Looking for a Cyber Security Engineer to focus on security risks and vulnerabilities. 5 plus years in a windows and Uni. x Identity access management authentication and malware server Firewalls system log correlation and analysis data encryption end point detection vulnerabilities assessments forensic tools web filtering spam prevention

This position is hands-on and includes performing security risk assessments on new and current technologies, analysis and reporting on vulnerabilities as part of the overall vulnerability management function, collaboration with Security Architecture on projects, and consulting to provide subject matter expertise.

Qualifications & Requirements

  • Six (6) years of direct work experience in security assessments, vulnerability management, or similar.
  • 4-year college degree in information technology or equivalent experience
  • Experience with assessments in Windows and Unix is required
  • Knowledge of IT security controls and IT infrastructure is required
  • Experience with cloud technologies such as Microsoft Azure IaaS and SaaS is required
  • Strong knowledge on Security frameworks and technologies such as ISO 27001, NIST, SOC, SIG is required
  • Scripting/automation experience such as Python, PowerShell and API integrations is preferred
  • Outstanding communication (verbal, written, visualization and listening) skills
  • Self-starter who can work independently as well as in a team setting
  • Interest in understanding customer perspective to aid in the development of the right solution
  • Commitment to delivering quality solutions
  • Ability to communicate technical topics to a non-technical audience
  • The ability to research and solve complex security and networking challenges
  • Demonstrated personal skills to effectively cooperate and communicate with business partners
  • Creative problem solving, analytical, industry knowledge, project management and communication

Technologies/Software

  • Knowledge of security technology capabilities
  • Knowledge of cloud capabilities, controls and implementation
  • Knowledge of security administration and role based security controls
  • Knowledge of authentication technologies and their interaction with different platforms, both on-site and remote
  • Knowledge of Identity & Access Management technologies
  • Knowledge of anti-malware technologies
  • Knowledge of Intrusion Detection and Intrusion Prevention technical capabilities
  • Knowledge of both client and server Firewalling technologies and their configuration and administration
  • Knowledge of security systems log correlation and analysis
  • Knowledge of data encryption technologies
  • Knowledge of Endpoint Detection and Response tools
  • Knowledge of vulnerability assessment and forensic tools
  • Knowledge of web filtering and email SPAM prevention techniques

Certificates, Licensures, Registrations

  • Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP) are preferred.

Posted Date: 13 Mar 2024 Reference: JSROBYNVUL Employment Agency: Request Technology - Robyn Honquest Contact: Robyn Honquest