Job Description
SUMMARY
Monitor security systems and events to assess, detect, analyze, and investigate threats. Work regularly to enhance current solutions to improve security posture. Communicate technical security requirements, install security measures, and recommend raising the level of security awareness. Participate in all cybersecurity incidents providing analysis and documentation.
Essential Duties And Responsibilities
Includes the following:
• Must be available 24x7 for cyber incident response support – we will find out more about this need but for now just make sure candidates understand they need to be flexible and will sometimes be on call.
• Fulfillment of responsibilities must be performed with little to no supervision
• Required to be in-office locations on a full-time basis
• Responsible for logging, tracking, documenting and resolving all cyber incidents in the designated solution
• Support security policies and standards
• Researches, evaluates and recommends new security services/solutions
• Develops, monitors and evaluates access control security standards.
• Designs and implements security controls designed to detect and protect against cyber-attacks and other persistent threats.
• Monitors and analyzes potential infrastructure security events to determine if event qualifies as a legitimate security incident.
• Investigates legitimate security incidents and submits findings following forensic guidelines to preserve evidence for potential legal action; recommends prevention solutions to IT security engineering and/or incident response.
• Performs regular network monitoring and intrusion detection analysis using various Computer Network Defense tools, such as Intrusion Detection/Prevention Systems, Firewalls, SIEM, NAC, and Vulnerability Management tools.
• Coordinates and performs penetration testing, vulnerability scanning and code reviews to identify and address security weakness and access control audits for systems and applications.
• Performs coordination and weekly updates to cybersecurity risks (risk register) including driving risks to closure with IT security engineering and other internal/external resources.
• Conducts correlation analysis across numerous internal and external data sources, identifying security incidents and supporting incident response activities.
• Assures all basic cybersecurity requests/incident tickets are closed in a timely manner and assigned changes, enhancements, and other ticket creation requests are submitted with all required data.
• Conducts interviews with end users involved with a security incident.
• Assists in conducting security testing, verification, and risk analysis of the company’s network and systems.
• Analyzes and reports patching status of OS and Applications and works directly with applicable teams for remediation.
• Assists in the creation and deployment of regular user training articles, phishing campaigns, and Cybersecurity Awareness campaigns.
• Collaborates with team to ensure all cybersecurity policies and procedures are regularly updated and maintained including upgrades to latest PCI and NIST standards.
• Participates in knowledge sharing to develop solutions efficiently.
• Provides project support as assigned
• Performs other job-related duties as assigned.
Supervisory / Management Authority
No supervisory/management authority.
Education And Experience
• Bachelor’s degree in computer science, information systems, or other related field, and 4 to 6 years of cybersecurity experience or an equivalent combination of education and experience. Four (4) years of information technology experience managing security solutions with a business network and Active Directory, mitigating viruses, malware, and spam, and/or reporting on vulnerability and risk via Qualys required. Certified Ethical Hacker (CEH) and/or Certified Information Systems Security Professional (CISSP) certifications preferred.
Knowledge, Skills And Abilities
Security Roadmap Developmen t:
• Define and develop a long-term cybersecurity strategy aligned with business objectives.
• Identify security gaps, risks, and future threats to create a prioritized security roadmap.
• Establish frameworks, policies, and best practices to enhance security posture.
Security Team Identification & Leadership:
• Assess current security team capabilities and identify skill gaps.
• Define roles and responsibilities for key security positions.
• Recruit, mentor, and build a high-performing cybersecurity team.
Technical Security Architecture & Implementation:
• Design and implement secure architecture for applications, networks, and cloud environments.
• Ensure compliance with industry standards (NIST, ISO 27001, CIS, etc.).
• Oversee security tool selection, deployment, and integration (SIEM, IAM, EDR, etc.).
Collaboration & Compliance:
• Work with IT, DevOps, and leadership to align security with business needs.
• Ensure regulatory compliance (GDPR, HIPAA, SOC 2, etc.).
• Communicate security risks and recommendations to executives and stakeholders.
Work Environment
• Work is primarily performed in a climate-controlled office-setting. Work may require travel, including overnight stays. Work will require varied shifts including, weekends and holidays, as needed (on call).
“Tekgence is an equal opportunity employer. Applicants must be authorized to work in the U.S. U.S. citizens and Green Card holders are strongly encouraged to apply”
...Join Our Team as a Work-From-Home Data Entry Research Panelist! Are you ready... ...schedule that fits your life. No Experience? No Problem! Comprehensive training is... ...outcomes. Enjoy the freedom of remote work while building your career....
...love while truly making a difference building healthier communities. If this sounds like you, we would love to have you apply as Chief of Staff to CEO, with Medical Home Network! Founded in 2009 by the Comer Family Foundation, Medical Home Network unites health...
...tracking of donor information, engagement levels, and recognitions. Assist with social... ...Required Qualifications : Bachelor's Degree Minimum 5 years of development/fundraising... ...Experience with soliciting and securing entry level to five-figure gifts and deployment...
...administrative leadership for the emergency department, while ensuring high-quality, efficient, and compassionate patient care. This includes managing staff, overseeing clinical operations, ensuring compliance with healthcare regulations, improving patient care processes, and...
...Initially, the Camp Holiday Trails' (CHT) Director of Philanthropy will have the following responsibilities: ~ Step 1: Recruit and Hire a Director of Annual Giving. Individual and Corporate Gift Sources Create an aggressive major donor ($10K and above giving...