Summary -
As a Sr. Cybersecurity Engineer at Advantive, you’ll play a crucial role in safeguarding Advantive’s systems and data against cyber threats. As a Senior member of the team you will be responsible for leading yourself and other members of security team for assessing organization’s security posture, implementing, and managing robust security measures, conducting vulnerability assessments, building security awareness through security training and newsletters, and responding to security incidents. You will use your deep technical and management experience to drive, deploy and optimize security solutions for both internal and customer assets. You will also be tasked with providing ongoing monitoring and intervention into alerts and anomalies, communicating with stakeholders and creating solution documentation for internal use. In addition, you’ll participate in efforts to leverage automation, public cloud offerings, open-source tools, and other technologies to improve the customer experience, foster a culture of discipline and efficiency, and reduce tedious tasks and workloads on behalf of your teammates. You will be expected to demonstrate Advantive values and embrace the Information Technology culture of operational discipline and excellence.
Duties -
Design, implement and manage cybersecurity solutions to protect Advantive’s infrastructure and sensitive information.
Conduct regular vulnerability assessments and penetration testing to identify and address security vulnerabilities.
Develop and maintain security policies, procedures, and documentation in compliance with industry standards and regulations.
Collaborate with cross-functional teams to integrate security measures into the development, Cloud Operations. Cloud migrations and deployment processes
Monitor Security logs and alerts to identify and respond to security incidents in a timely manner.
Stay up-to-date with the lates cybersecurity threats, tends, and technologies to ensure the Advantive’s defenses are proactive and effective.
Work with external vendors and partners to enhance the overall security posture of the organization.
Implement security awareness, newsletters, develop bootcamps and training program to improve organization’s effectiveness in safeguarding systems and data against cyber threats.
Deploys, integrates, optimizes, configures, evaluates, tests, debugs, and administers applications, databases, and the underlying program, network, and physical, virtual, and/or public cloud infrastructure necessary to adequately support their operation.
Supports opportunities for process improvement, re-engineering, and automation, and employs practices intended to improve customer satisfaction and reduce costs.
Expected to continue to mentor and train other members of their department through informal knowledge transfer opportunities and formalized training.
Support or respond to escalations arising from needs within and outside of conventional business hours and days. This duty may be scheduled in advance or in an on-call capacity according to the needs of the organization.
Expected Behaviors -
To perform the job successfully, an individual should demonstrate the following behaviors:
Discipline and Perseverance: Focus and commitment to solving complex issues through to completion
Project Management: Strong project management skills including creating work breakdown tasks, building detail project plan, and executing on time and with quality.
Effective Communication: Strong written and oral communication skills
Excellent Time Management: a proven ability to embrace a sense of urgency to prioritize tasks
Flexibility and Hard Work: Operate in a fast-paced and iterative environment while adapting to new technologies.
Problem-Solving: Strong critical thinking and problem-solving capabilities
Quality: Dedicated to producing high-quality product deployment and hosting best practices
Self-Improvement: actively self-improves through individual learning, coursework, or otherwise.
Teamwork: Communicate effectively and operate collaboratively within a team environment
Relevant Skills, Experience, Education, and Certification(s) -
Bachelor's degree or higher in Cybersecurity, Information Technology, or a related field
Minimum of 7-10 years of progressively responsible experience in cybersecurity, with a significant focus on ISSO responsibilities
Certifications such as CISSP, CISM, CompTIA Security+, or equivalent are highly desirable.
Deep technical knowledge of Cyber Security and IT infrastructure is a must:
Cyber Security frameworks (ISO 27001/2, NIST, CIS, etc.)
Security Architecture principles (Zero Trust, Defense-in-Depth, Least Privilege, etc.)
Environments: Cloud (AWS, Azure), Networks, IoT, Endpoints, Mobile, etc.)
Security Program Phases (Risk Assessment, Architecture and Design, Implementation, Operations and Monitoring)
Strong knowledge of cybersecurity frameworks, standards, and best practices.
Knowledge on security tools and frameworks such as including but not limited to Arcticwolf, CrowdStrike, Tanium, Okta, Intune, Proofpoint and Knowbe4 are highly desirable.
Ability to identify, analyze, prioritize, mitigate, and communicate project risks and issues.
Proven experience with or conceptual understanding of the analysis, deployment, integration, optimization, troubleshooting, and consultation of the following disciplines or technologies is required:
Virtualization software including VMware and/or Microsoft Hyper-V
Cloud computing programs including Amazon EC2, S3 and/or Microsoft Azure
SSL Accelerator/load balancer appliances from F5, Cisco, and/or Kemp Technologies
Complex client/server and web-hosted application software
Client and enterprise-level operating systems including Macintosh, Windows, and/or Linux and network operating systems including Microsoft, Novell, and/or Cisco
LAN, WAN, and wireless networking concepts and fundamentals such as DNS, DHCP, SSL, firewalls, VLAN's, IP subnetting, routers, switches, and TCP/IP networking
Significant experience with third-party hardware repair/troubleshooting
Storage technologies such as Storage Array Networks (SAN), Network Attached Storage (NAS), Direct Attached Storage (DAS) and RAID strategies governing data storage
LDAP solutions such as Active Directory, Novell eDirectory, and Apple Open Directory
Enterprise backup systems and best practices
Automation using Ansible, Batch, Kubernetes, Windows Powershell, or shell scripts
Emerging ability to use Microsoft 365 Suite, Salesforce CRM, and other business tools
Proven ability to learn new concepts and remain up to date with new technologies.
Ability to support the leadership or direction of projects by accurately fulfilling scope within the previously estimated level of effort to realized expected outcomes and mitigate identified risks
Proven ability to work independently to understand, communicate, and resolve business problems in situations where little supervision, standardization, or information exists
Ability to work within a larger project team or department in a fast-paced, dynamic, and demanding environment
Proven ability to work concurrently on projects of varying size/scope and duration
Ability to foster and maintain an effective relationship with colleagues, customers, and vendors
Ability to provide advanced remote and/or onsite break-fix support
Ability to dependably complete reporting in a very timely and accurate manner
Proven ability to anticipate, recognize, mitigate, and resolve potential problems with rigorous decisions and solutions consistent with organizational goals
Ability to convey information and ideas clearly, concisely, and persuasively using terminology and jargon appropriate for the intended audience
Ability to demonstrate initiative and responsibility for successes and failures.
Demonstrable instinct to scrutinize existing business processes to improve efficiency, quality, and efficacy of services
Emerging ability to anticipate impact of decisions before executing them by perceiving and evaluating alternatives and looking beyond the obvious
Ability to support business strategies to improve revenue and profitability.
Ability to inspire and instill confidence in peers and colleagues by fulfilling services demand with a high degree of quality and productivity
Ability to conduct oneself with a professional appearance and demeanor