Senior Cybersecurity Engineerother related Employment listings - Charlotte, NC at Geebo

Senior Cybersecurity Engineer

Senior Cybersecurity Engineer
Summary:
Signature Consultants is seeking a Senior Cybersecurity Engineer for an opportunity in Charlotte, NC.
The Cybersecurity Engineer will need to utilize solid business knowledge and expert technical experience in security to provide leadership and expertise as it relates to engineering cutting edge authentication solutions.
He or she will be responsible for the identification, analysis, evaluation, life-cycle management, and adoption of security technologies that support business requirements and align with security standards and controls, as well as plan, coordinate, and deliver information security engineering activities.
The Engineer will work closely with all areas of IT, business units, and strategic partners and vendors to ensure security initiatives are in line with all other key initiatives that may have interdependencies.
This role requires extensive expertise in problem-solving and a solid understanding of offensive security Tactics, Techniques, and Procedures (TTPs) while delivering cutting edge technologies.
Responsibilities:
Support project teams to recommend technologies that align to the business and IT mission along with reviewing/validation of security controls are properly incorporated Effective provisioning, installation, configuration, operation, and maintenance of security systems and services to protect the authenticity of data by ensuring the necessary authentication and encryption controls are in place Participate in the day-to-day operations involving information security to protect against business interruption and unauthorized access to confidential client, personnel, and financial information/data Constantly monitor the maturity of the cybersecurity program by identifying new threats and staying up-to-date in the community at-large with best practices and new security technologies Provide ways to improve current technologies by strategizing on how to turn on new features and keeping up with vendor roadmaps Assist with internal security monitoring, alerting, incident management and other 'business as usual' security tasks Design, engineering and implementation of the security strategy for the organization Design, engineering and administration of directory services Design, engineering and administration of multifactor authentication solutions Design, engineering and administration of SaaS and cloud federation services solutions Design, engineering and administration of SSO and SAML authentication solutions Design, engineering and administration of Identity and Access/Governance Management solutions Design, engineering and administration of RBAC methods Design, engineering and administration of certificates, key, and password management solutions Design, engineering and administration of authentication logs into the SIEM Design, engineering and administration of authentication polices for mobile devices Understand and recommend changes to the security landscape, tools and processes for continuous improvement Participate in and help manage the security incidents Investigate security alerts/incidents Remediate issues that arise due to virus, worms, rootkits, malware, etc.
Perform monthly vulnerability scans Help lead Security processes around security compliance Encrypt data that is sensitive for data in motion and data at rest Demonstrate a strong ability to work in various authentication ports, protocols, and services Give guidance and direction to Administration and Support teams Demonstrate a commitment to lifelong learning Fulfill additional, relevant, tasks appropriate to the role and business demands Manage a project and escalation process from beginning to end
Qualifications:
Kerberos SAML SSO Identity Provider and Federation Services Azure AD/ADFS AWS Directory Services RADIUS Certificate Management Key Management Encryption and Hashing Active Directory LDAP VPN Password Management Identity and Access/Governance Management Threat Intel Powershell Strong troubleshooting and problem solving skills Ability to work independently Ability to perform research independently and own projects (Proof of Concept, cost benefit analysis and SWOT assessments) ensuring timely completion Should have an in depth background in authentication technologies and be passionate about information security, including the willingness to learn and advance Bachelors and/or Master's Degree in Information Systems, Computer Science, Information Security, Cybersecurity, Information Assurance (IT related) Minimum 5 years' of technical and hands on experience in information security Ability to keep up with the threat landscape Strong problem solving skills and thinking outside the box Strong analytical and product management skills required Excellent verbal and written communication skills and the ability to interact professionally with a diverse group including; executives, managers, IT personnel, and subject matter experts Strong sense of urgency and desire to see solutions implemented expediently Ability to communicate clearly and effectively within various levels of the organization Certifications (One or more of the following certifications should be current and up to date):
CISSP (desired) CISM (desired) CEH (desired) About Signature Consultants, LLC Headquartered in Fort Lauderdale, Florida, Signature Consultants was established in 1997 with a singular focus:
to provide clients and consultants with superior staffing solutions.
For the eighth consecutive year, Signature was voted as one of the Best Staffing Firms to Work For and is now the 14th largest IT staffing firm in the United States (source:
Staffing Industry Analysts).
With 26 locations throughout North America, Signature annually deploys thousands of consultants to support, run, and manage their clients' technology needs.
Signature offers IT staffing, consulting, managed solutions, and direct placement services.
For more information on the company, please visit www.
sigconsult.
com.
.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.