Job Opportunity: Cybersecurity Engineer (Washington, DC)
Elite Wave Careers, on behalf of our client, is excited to present an outstanding opportunity for a seasoned Cybersecurity Engineer. This role is ideal for a professional who thrives in dynamic environments, with a blend of Security Operations and Engineering responsibilities. The successful candidate will play a pivotal role in securing customer cloud computing, data center, and on-premise environments.
About The Role
The Cybersecurity Engineer will be responsible for managing various security solutions, developing and maintaining security policies and procedures, and performing incident response and business continuity testing. This position offers a hybrid work model after a probationary period, allowing for flexibility and a balanced work-life approach.
Key Responsibilities
- Ensure adherence to security standards.
- Serve as the primary contact for planning, developing, testing, and implementing IT security controls.
- Maintain and document system security baselines.
- Develop and execute comprehensive information security plans and policies.
- Formulate strategies and procedures to respond to, recover from, and investigate security breaches.
- Implement and manage open-source and third-party tools for threat detection, prevention, and analysis.
- Install, configure, and update firewalls, data encryption, and other security products.
- Conduct periodic network scans to identify and remediate vulnerabilities.
- Monitor networks and systems for security breaches using intrusion detection software.
- Perform penetration testing and engage in proactive threat hunting activities.
- Analyze security issues and respond effectively to security incidents.
Must-Have Qualifications
- 9+ years of industry experience in an Information Security role with a degree, or 12+ years without a degree.
- Bachelor’s degree or equivalent experience.
- Proficiency with Palo Alto (preferred) or Cisco firewall, network security appliance administration, and cloud security.
- Experience with vulnerability scanners and management, preferably Tenable Nessus and Qualys.
- Strong foundational knowledge of Windows and Linux (RHEL) operating systems, network traffic analysis, and security events.
- Experience with RMF, A&A, IV&V, and continuous monitoring.
- Knowledge of security baselines and controls (CIS Benchmark, DISA STIG, NIST 800-53).
- Experience with log aggregation/SIEM tools such as Splunk or similar.
- Capability to support and provide artifacts for annual audits and ATO review processes (FISMA, FISCAM, etc).
- Up-to-date knowledge of adversarial techniques and incident response procedures.
- Technical understanding of network operations, server architectures, storage solutions, and desktop hardware/software.
- Strong communication skills with peers, supervisors, and senior leadership.
- Decision-making skills to assess situations, determine importance, urgency, and risks, and make timely decisions.
- AWS and Azure experience.
- Certifications such as CISSP, CISA, and PCNSE.
- Ability to obtain a public trust clearance.
Location:
Washington, DC (Hybrid work model available after probation period)
Salary
$145k - $160k
Benefits
The client offers a "top of the line" benefits package that includes comprehensive health, dental, and vision coverage, retirement plans, and opportunities for professional development.
Skills: qualys,fiscam,pcnse,linux,splunk,cisa,iv&v,a&a,fisma,firewalls,azure,windows,aws,rhel,rmf,cissp,cis benchmark,security breaches,disa stig,adversarial techniques,cisco firewall,data encryption,ato review,vulnerability scanners,tenable nessus,security standards,security solutions,server architectures,cloud security,network scans,security events,security baselines,security operations,security incidents,penetration testing,security controls,storage solutions,palo alto,incident response,threat hunting,network operations,desktop hardware/software,nist 800-53,information security plans,analyze security issues,business continuity testing,incident response procedures,intrusion detection software,network traffic analysis,security policies and procedures,network security appliance administration,document system security baselines,open-source and third-party tools