Job Information
Applied Technology Services Enterprise Cybersecurity Engineer in Baltimore, Maryland
If you are seeking a position with a strong team, focused on doing great things every day, with the opportunity to sell a wide array of technological solutions from the desktop to the data center, then join our team at ATS! We are looking for talented, creative individuals to help our customers solve problems.
Applied Technology Services (ATS) is an IT systems integrator and has been a trusted partner to customers in the Mid-Atlantic region for 20 years. We have core competencies in Enterprise Modernization, Infrastructure Services, End User Computing, Workforce Optimization, Cyber Security Solutions, and IT Staffing. ATS provides a wide array of professional and managed services from the data center to the desktop. ATS holds minority certifications in Delaware, Maryland, the District of Columbia, Pennsylvania, and Virginia and is a Third-Party Certified Women Owned Small Business (WOSB).
General Summary:
The Enterprise Cyber Security Engineer will be responsible for log management, host security, cloud security, asset discovery, vulnerability management, incident response, threat intelligence, Security Incident and Event Management (SIEM), Security Orchestration and Automated Response (SOAR), Network Access Control, and network security. The Enterprise Cyber Security Engineer will be responsible for one or more of these technologies, often working with one or more team members to support these functions.
Job Scope/Complexity:
Cybersecurity efforts are complex due to our mission and the complexity of supporting security projects and CJIS policy requirements. Incidents and projects are complex and varied, requiring the ability to balance the demands of multiple projects.
Job Responsibilities:
The responsibilities below illustrate work performed by this position. Not all duties assigned to this position are included, nor is it expected that everyone in this position will be assigned every job responsibility.
SECURITY MONITORING
Respond to all user, system, and network security incidents.
Troubleshoot problems associated with security tools.
Stay abreast of emerging security threats, vulnerabilities, and controls.
Filter and analyze large datasets from security logging and telemetry sources and build tools to integrate data into operational controls.
Automate security controls, data, and processes to provide improved metrics and operational support.
Filter and analyze large datasets from security logging and telemetry sources and build tools to integrate data into operational controls, including SIEM and log Aggregation Tools. Tools may include Splunk or other managed SIEM solutions that utilize the Open Cybersecurity Schema Framework to normalize log data.
Knowledge of the latest trends and awareness of current hacking techniques and cybercrime.
Familiarity with firewall rules and advanced threat protection capabilities in next-generation firewall technologies is a plus. Candidate should have a working knowledge of either Cisco or Palo Alto firewall technologies.
HOST AND CLOUD SECURITY
Implement and administer automated security update technologies for client and server systems. Candidates should be familiar with WSUS for server patching, Intune for client patching or SCCM.
Implement and administer advanced endpoint protection technologies. Technologies should include Windows Defender, CrowdStrike or other 3rd party MDR agents.
Test and identify network and system vulnerabilities and work with the appropriate owners to address them. Candidates should be familiar with network scanners such as Nessus, Tenable or Qualys and be able to interpret reporting and communicate remediation steps to others in the department.
Help shape the organization’s security policies and standards for use in on-premises and cloud environments.
Create technical documents on the use of security technologies.
DATA SECURITY AND COMPLIANCE
Direct and influence multi-disciplinary teams in implementing and operating information security controls. Candidate should be familiar with NIST, CJIS or CIS frameworks and understand how to implement one or more of these standards in a working environment.
Provide subject matter expertise on information security architecture and systems engineering to other IT and business teams.
Interpret security and technical requirements into business requirements and communicate security risks to relevant stakeholders.
Perform other related duties as requested.
Minimum qualifications (mandatory):
Bachelor’s degree. Additional experience may be substituted for education.
Two years of related work experience with computer systems, applications and Cyber Security technologies. Additional education may be substituted for experience.
Preferred Job Qualifications:
Knowledge in the assigned technical areas this position is responsible for.
A CISSP certification is desirable.
Advanced:
Scripting
Cyber Threat Intelligence
Security Information and Event Management (SIEM)
Intrusion Detection and Prevention
Security Engineering
Vulnerability Management
Enterprise Risk Management (ERM)
Security Configuration Management / Endpoint Security
Programming Languages
Authority Technical Skills:
Cyber Security Strategy
*The core technical skills listed are most essential; additional technical skills may be required based on specific division or department needs.
Full-Time Employee Benefits:
Competitive compensation
Health benefits including Medical, Dental and Vision
Vacation and Personal Days
401K
Employee Assistance Plan
Continuous education and learning opportunities.
Powered by JazzHR