Job Description
SUMMARY
Monitor security systems and events to assess, detect, analyze, and investigate threats. Work regularly to enhance current solutions to improve security posture. Communicate technical security requirements, install security measures, and recommend raising the level of security awareness. Participate in all cybersecurity incidents providing analysis and documentation.
Essential Duties And Responsibilities
Includes the following:
• Must be available 24x7 for cyber incident response support – we will find out more about this need but for now just make sure candidates understand they need to be flexible and will sometimes be on call.
• Fulfillment of responsibilities must be performed with little to no supervision
• Required to be in-office locations on a full-time basis
• Responsible for logging, tracking, documenting and resolving all cyber incidents in the designated solution
• Support security policies and standards
• Researches, evaluates and recommends new security services/solutions
• Develops, monitors and evaluates access control security standards.
• Designs and implements security controls designed to detect and protect against cyber-attacks and other persistent threats.
• Monitors and analyzes potential infrastructure security events to determine if event qualifies as a legitimate security incident.
• Investigates legitimate security incidents and submits findings following forensic guidelines to preserve evidence for potential legal action; recommends prevention solutions to IT security engineering and/or incident response.
• Performs regular network monitoring and intrusion detection analysis using various Computer Network Defense tools, such as Intrusion Detection/Prevention Systems, Firewalls, SIEM, NAC, and Vulnerability Management tools.
• Coordinates and performs penetration testing, vulnerability scanning and code reviews to identify and address security weakness and access control audits for systems and applications.
• Performs coordination and weekly updates to cybersecurity risks (risk register) including driving risks to closure with IT security engineering and other internal/external resources.
• Conducts correlation analysis across numerous internal and external data sources, identifying security incidents and supporting incident response activities.
• Assures all basic cybersecurity requests/incident tickets are closed in a timely manner and assigned changes, enhancements, and other ticket creation requests are submitted with all required data.
• Conducts interviews with end users involved with a security incident.
• Assists in conducting security testing, verification, and risk analysis of the company’s network and systems.
• Analyzes and reports patching status of OS and Applications and works directly with applicable teams for remediation.
• Assists in the creation and deployment of regular user training articles, phishing campaigns, and Cybersecurity Awareness campaigns.
• Collaborates with team to ensure all cybersecurity policies and procedures are regularly updated and maintained including upgrades to latest PCI and NIST standards.
• Participates in knowledge sharing to develop solutions efficiently.
• Provides project support as assigned
• Performs other job-related duties as assigned.
Supervisory / Management Authority
No supervisory/management authority.
Education And Experience
• Bachelor’s degree in computer science, information systems, or other related field, and 4 to 6 years of cybersecurity experience or an equivalent combination of education and experience. Four (4) years of information technology experience managing security solutions with a business network and Active Directory, mitigating viruses, malware, and spam, and/or reporting on vulnerability and risk via Qualys required. Certified Ethical Hacker (CEH) and/or Certified Information Systems Security Professional (CISSP) certifications preferred.
Knowledge, Skills And Abilities
Security Roadmap Developmen t:
• Define and develop a long-term cybersecurity strategy aligned with business objectives.
• Identify security gaps, risks, and future threats to create a prioritized security roadmap.
• Establish frameworks, policies, and best practices to enhance security posture.
Security Team Identification & Leadership:
• Assess current security team capabilities and identify skill gaps.
• Define roles and responsibilities for key security positions.
• Recruit, mentor, and build a high-performing cybersecurity team.
Technical Security Architecture & Implementation:
• Design and implement secure architecture for applications, networks, and cloud environments.
• Ensure compliance with industry standards (NIST, ISO 27001, CIS, etc.).
• Oversee security tool selection, deployment, and integration (SIEM, IAM, EDR, etc.).
Collaboration & Compliance:
• Work with IT, DevOps, and leadership to align security with business needs.
• Ensure regulatory compliance (GDPR, HIPAA, SOC 2, etc.).
• Communicate security risks and recommendations to executives and stakeholders.
Work Environment
• Work is primarily performed in a climate-controlled office-setting. Work may require travel, including overnight stays. Work will require varied shifts including, weekends and holidays, as needed (on call).
“Tekgence is an equal opportunity employer. Applicants must be authorized to work in the U.S. U.S. citizens and Green Card holders are strongly encouraged to apply”
...Worksite Setting : Hospital Scope of Work : General, Spines, OB, some Ortho, Cath lab Licenses, Certifications, Requirements... ...be able to do OB epidurals)~ Will be supervised by MD until physicians are comfortable with skill level, then will be doing their own cases...
...We have been retained by the President & CEO of a growing Affordable Housing Development & Consulting firm in Los Angeles. The CEO brings 12+ years of experience in Affordable Housing Development and bachelor's and master's degrees from Ivy League universities. We've...
...ability to collaborate with team members in a multi-disciplined environment. All successful candidates must: Be proficient in English, both verbally and in writing. Must have proven structural design and analysis experience. Must be willing to obtain PE...
...Surgery - Hospital employed Cardiothoracic Surgery PA position joining a well established (17) physician and (11) APP group with (3) CTS physicians and (3) CTS-PA's adding a fourth CTS PA in a traditional outpatient|inpatient position with first assist surgery in a desirable...
...providing excellent customer service while delivering customer orders... ...to the home. Drive a company delivery vehicle showing safe,... ...safety.From one tiny Cincinnati grocery store more than a century ago... ...Benefits Page ! Valid driver's license Excellent communication...