Job Description
SUMMARY
Monitor security systems and events to assess, detect, analyze, and investigate threats. Work regularly to enhance current solutions to improve security posture. Communicate technical security requirements, install security measures, and recommend raising the level of security awareness. Participate in all cybersecurity incidents providing analysis and documentation.
Essential Duties And Responsibilities
Includes the following:
• Must be available 24x7 for cyber incident response support – we will find out more about this need but for now just make sure candidates understand they need to be flexible and will sometimes be on call.
• Fulfillment of responsibilities must be performed with little to no supervision
• Required to be in-office locations on a full-time basis
• Responsible for logging, tracking, documenting and resolving all cyber incidents in the designated solution
• Support security policies and standards
• Researches, evaluates and recommends new security services/solutions
• Develops, monitors and evaluates access control security standards.
• Designs and implements security controls designed to detect and protect against cyber-attacks and other persistent threats.
• Monitors and analyzes potential infrastructure security events to determine if event qualifies as a legitimate security incident.
• Investigates legitimate security incidents and submits findings following forensic guidelines to preserve evidence for potential legal action; recommends prevention solutions to IT security engineering and/or incident response.
• Performs regular network monitoring and intrusion detection analysis using various Computer Network Defense tools, such as Intrusion Detection/Prevention Systems, Firewalls, SIEM, NAC, and Vulnerability Management tools.
• Coordinates and performs penetration testing, vulnerability scanning and code reviews to identify and address security weakness and access control audits for systems and applications.
• Performs coordination and weekly updates to cybersecurity risks (risk register) including driving risks to closure with IT security engineering and other internal/external resources.
• Conducts correlation analysis across numerous internal and external data sources, identifying security incidents and supporting incident response activities.
• Assures all basic cybersecurity requests/incident tickets are closed in a timely manner and assigned changes, enhancements, and other ticket creation requests are submitted with all required data.
• Conducts interviews with end users involved with a security incident.
• Assists in conducting security testing, verification, and risk analysis of the company’s network and systems.
• Analyzes and reports patching status of OS and Applications and works directly with applicable teams for remediation.
• Assists in the creation and deployment of regular user training articles, phishing campaigns, and Cybersecurity Awareness campaigns.
• Collaborates with team to ensure all cybersecurity policies and procedures are regularly updated and maintained including upgrades to latest PCI and NIST standards.
• Participates in knowledge sharing to develop solutions efficiently.
• Provides project support as assigned
• Performs other job-related duties as assigned.
Supervisory / Management Authority
No supervisory/management authority.
Education And Experience
• Bachelor’s degree in computer science, information systems, or other related field, and 4 to 6 years of cybersecurity experience or an equivalent combination of education and experience. Four (4) years of information technology experience managing security solutions with a business network and Active Directory, mitigating viruses, malware, and spam, and/or reporting on vulnerability and risk via Qualys required. Certified Ethical Hacker (CEH) and/or Certified Information Systems Security Professional (CISSP) certifications preferred.
Knowledge, Skills And Abilities
Security Roadmap Developmen t:
• Define and develop a long-term cybersecurity strategy aligned with business objectives.
• Identify security gaps, risks, and future threats to create a prioritized security roadmap.
• Establish frameworks, policies, and best practices to enhance security posture.
Security Team Identification & Leadership:
• Assess current security team capabilities and identify skill gaps.
• Define roles and responsibilities for key security positions.
• Recruit, mentor, and build a high-performing cybersecurity team.
Technical Security Architecture & Implementation:
• Design and implement secure architecture for applications, networks, and cloud environments.
• Ensure compliance with industry standards (NIST, ISO 27001, CIS, etc.).
• Oversee security tool selection, deployment, and integration (SIEM, IAM, EDR, etc.).
Collaboration & Compliance:
• Work with IT, DevOps, and leadership to align security with business needs.
• Ensure regulatory compliance (GDPR, HIPAA, SOC 2, etc.).
• Communicate security risks and recommendations to executives and stakeholders.
Work Environment
• Work is primarily performed in a climate-controlled office-setting. Work may require travel, including overnight stays. Work will require varied shifts including, weekends and holidays, as needed (on call).
“Tekgence is an equal opportunity employer. Applicants must be authorized to work in the U.S. U.S. citizens and Green Card holders are strongly encouraged to apply”
...Cortica is looking for a Behavior Interventionist to join its growing team! In this role, you will provide direct behavior therapy services to individuals with autism and work as part of a multidisciplinary treatment team. This role presents an exciting opportunity to...
Opportunity to work for a Uppermost Healthcare Facility in New Mexico! The Medical Laboratory Technician/Medical Technologist is responsible for testing in the laboratory, reviews and maintains quality control and preventative maintenance records. Associate"s degree ...
...The Financial Controller will be responsible for the administrative, accounting, and tax management of four companies based in Chicago, ensuring compliance with local regulations and international accounting principles. The role requires constant oversight of warehouse...
...strive to be a welcoming and safe space where the stories and identities of all youth are honored and celebrated. If you are a designer or technician interesting in working with Mudlark, please send your production resume to ****@*****.***....
...installation, and service of HVAC, plumbing, electrical, fire protection, and control systems... .... Develop and maintain detailed project schedules, including manpower allocation... ..., and safety protocols. Estimate and manage changes in project scope. Select, negotiate...