Cyber Security Engineer

Arlington, Virginia

Applications have closed

Two Six Technologies is seeking a highly motivated cyber security engineer with strong technical, communication, and organizational skills to join our cyber security team. This individual will be supporting the overall organization in providing cyber security support to Two Six’s network, to ensure systems are updated, online, and secure, allowing the staff to fulfill their mission in supporting our customers.

The security team is responsible for a broad suite of security technologies that include vulnerability scanning, malware detection, log file analysis, and enterprise-wide incident response and security information and event management (SIEM).

The engineer will be responsible for the initial evaluation, testing, and implementation of new security software and the ongoing operations, support, and maintenance of the current organization’s suite of tools.

Responsibilities

  • Experience with Administering, and Maintaining a variety of tools including hands-on experience in at least two of the following security disciplines:
    • Endpoint Detection and Response (EDR)
    • Identity and Access Management (IAM)
    • Security Information and Event Management (SIEM)
    • Mobile Device Management (MDM), Patching, and Vulnerability Management across the various operating systems (macOS, Windows, and Linux).
  • Provide technical Vulnerability Identification and Analysis
  • Document findings and provide technical advisory support
  • Assist with implementation and the maintenance of security configuration baselines

Qualifications

Required Qualifications

  • 2-3 years of experience in the cyber security field with primary focus on endpoint security.
  • Knowledge of network-based and host-based IDS/IPS
  • Knowledge of key concepts in security management (e.g., Release Management, Patch Management)
  • Knowledge of auditing and logging procedures (including server-based logging)
  • Knowledge of basic system, network, and OS hardening techniques
  • Develop and coordinate Incident Response, Disaster Recovery, Contingency Planning and Testing
  • Knowledge of applying cybersecurity and privacy principles to organizational and known security (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
  • Experienced in administering Windows, macOS, and Linux/Unix-based operating systems
  • Develop detailed documentation as it pertains to product deployment, configuration, upgrading, and maintenance for Change Management requests
  • Develop secure standard guidelines on configuration management and hardening process
  • Develop and maintain technical and operational documentation and diagrams related to the organization’s infrastructure
  • Solid understanding of Cloud infrastructure (AWS, GCP, Azure)
  • Coding/scripting skills to include but not limited to Python, Bash, VBScript
  • One or more security certifications such as:
    • Security+ | CEH | CISSP | CISA | CASP | CCNA

Desired Qualifications

  • Bachelor's Degree in Computer Science, Computer Information Systems, Electrical Engineering or Equivalent Degree
  • Clearance: Active TS or ability to obtain
  • Intimate Knowledge of Security configuration baselines and best practices to include NIST 800-53/171, CMMC

 

#LI-ZS1

#LI-Onsite

Two Six Technologies is an Equal Opportunity Employer and does not discriminate in employment opportunities or practices based on race (including traits historically associated with race, such as hair texture, hair type and protective hair styles (e.g., braids, twists, locs and twists)), color, religion, national origin, sex (including pregnancy, childbirth or related medical conditions and lactation), sexual orientation, gender identity or expression, age (40 and over), marital status, disability, genetic information, and protected veteran status or any other characteristic protected by applicable federal, state, or local law. 

Two Six Technologies Covid-19 Vaccination Policy requires employees to be fully vaccinated. Exceptions to this policy are only granted to those with a company-approved medical or religious accommodation.  Prospective or new employees will be required to adhere to this policy and submit proof of vaccination or have an approved exemption prior to the start of their employment.   

If you are interested in applying for employment with Two Six Technologies and require an accommodation, please contact Human Resources at Two Six Technologies by sending an email to hr@twosixtech.com.  Information provided will be kept confidential and used only to the extent required to provide needed reasonable accommodations.

EOE, including disability/vets. 

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Audits AWS Azure Bash CASP+ CEH CISA CISSP Clearance Cloud CMMC Computer Science EDR Endpoint security GCP IAM IDS Incident response IPS Linux MacOS Malware NIST Privacy Python Scripting SIEM UNIX Vulnerability management Windows

Region: North America
Country: United States
Job stats:  18  2  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.