Cyber Security Engineer

Published date Posted on Indeed on Aug 06, 2022 (13 d ago)

PURPOSE OF THE POSITION Why the position exists and how you make a difference

The purpose of the position is to successfully implement security solutions and provide deep expertise to help ensure the client’s business needs are met.

KEY SKILLS, KNOWLEDGE & EXPERIENCE Technical capabilities you learn and acquire

  • Extensive experience in the following solution stacks:
    • Identity and Access Management (IAM)
    • Hardware Security Modules (HSM)
    • Cloud Key Management
    • Encryption
  • Experience and\or understanding a plus in these additional Manufacturer solution stacks::
    • Thales Suite (Preferred)
    • Varonis
    • Mimecast
    • Sophos
    • Palo Alto

KEY OUTCOMES The outcomes and main goals that define what success in this position looks like

  • Drive client engagement – work closely with clients and lead the successful implementation of and effective ongoing use of solutions
  • Collaborate for success – partner with others to help identify and scope opportunities, support ongoing maintenance and problem solving, and help ensure the client’s business needs are met

Our client believes technology is part of a solution and not the end goal. Their mission is to deliver best of class IT solutions to businesses through a friendly experience to achieve our their business goals.

The following additional responsibilities come with this position

  • Proactively assess (pre-sales) solution designs against client requirements and recommend solution changes that optimize value for both client and the company
  • Lead the implementation of new client security solutions and identify and resolve complex issues that ensure the highest levels of customer success
  • Provide accurate and timely documentation
  • Support effective knowledge transfer to clients and team members
  • Maintain high levels of productivity and reliability of your work
  • Contribute to the continuous improvement of our solution stack and delivery methodology

INNATE STRENGTHS The personal qualities and characteristics that describe who you are

  • Learns continuously and seeks to analyze and understand security and technology
  • Takes pride in solving and preventing deep security and technical challenges
  • Stays focused and organized under strict time frames and deadlines
  • Communicates clearly and collaborates well with others
  • Lead with integrity and professionalism always

MINIMUM QUALIFICATIONS Requirements you must meet to be considered for the position

  • At least two (2) year of experience in Cyber Security
  • ConnectWise or other CRM tool experience preferred but not required
  • Legally authorized to work in the United States
  • High school diploma or general education degree (GED) required; Bachelor’s degree preferred but not required
  • Ability to travel independently as needed; about 30%.
  • Ability to preserve confidentiality of information.
  • Ability to communicate effectively in English: verbally, written and presentation style.
  • Ability to work collaboratively with employees in all positions and titles.
  • Ability to problem solve within a large diverse group of co-workers.
  • Ability to organize and prioritize a variety of tasks/projects.
  • Ability to work within strict time frames and resolute deadlines.
  • Ability to be highly motivated, self-starting and results driven.


7bs6Y98zDw


Let us know

Help us maintain the quality of jobs posted on RemoteTechJobs and let us know if:

Loading...
Success
Error on reporting

Related jobs

Insight Global Insight Global |
|
Today

IoT Security EngineerFully RemotePermanent Hire: $125,000 - $135,000 depending on relevant experienceInsight Global is seeking a Security Engineer to work at one of our top manufacturing clients. This person is going to be responsible for the security.

Ascensus Ascensus |
|
2 d ago

Section 1: Position SummaryReporting to the BISO, the Application Security Engineer is responsible for the application security program. This position requires a passion for data protection, possesses a combination of either application development and/or.

Tista Science and Technology Corporation Tista Science and Technology... |
Today

Overview:Are you a Senior Security Analyst that would like to be part of delivering initiatives for digitization, automation, modernization, infrastructure, security, and interoperability of systems and processes to provide Veterans and their families.

Gray Tier Technologies Gray Tier Technologies |
Today

Gray Tier Technologies is seeking a talented Lead Splunk Engineer to join our team to support a federal customer within the Department of Homeland Security (DHS) Enterprise Security Operations Center (ESOC). The Splunk Engineer provides support across.

Description:Overview:Vaultes is a rapidly growing enterprise IT and cybersecurity company headquartered in the Washington DC metro area. Serving customers across the Federal government and commercial sectors, we use our broad experience and deep technical.

Opala is growing and seeking an experienced Application Security Engineer to complement our team. This Engineer will be responsible for reducing risk across Opala along with partnering with engineering and product teams during each point of the software.

INFOMATICS, INC. INFOMATICS, INC. |
Yesterday

Sunday through Thursday** 9 PM local start times **Description:Responsible for providing network security expertise related to any of the following: activation and turn up of customer security equipment, failover testing, monitoring network security.

More jobs by this company

MetroSys MetroSys |
20 d ago

We are looking for a highly skilled computer programmer who is comfortable with both front and back end programming. The developer will be responsible for developing and designing front end web architecture, ensuring the responsiveness of applications,.

MetroSys MetroSys |
23 d ago

ResponsibilitiesDesigns, deploys, and operates systems, networks, applications, and tools that underpin cyber security and cyber defense. Provides integration of hardware, software, and other components to solve operational challenges for cyber defenders..