Teal (tealtech.com) Logo

Teal (tealtech.com)

Cybersecurity Engineer

Posted 25 Days Ago
Remote
Hiring Remotely in United States
100K-120K Annually
Senior level
Remote
Hiring Remotely in United States
100K-120K Annually
Senior level
The Cybersecurity Engineer protects clients by managing security monitoring solutions, vulnerability management, and compliance in cloud and on-premises environments.
The summary above was generated by AI

In 2023, TechGen and Aligned Technology Solutions, both award-winning Managed IT Service Providers, merged – forming the premier company of Teal. Teal is an advanced IT services that assists small- to medium-sized organizations in strategically leveraging their technology. With roots dating back to 2000, the company differentiates itself from its competition through world-class concierge service, business-focused support, and sophisticated cybersecurity and compliance knowledge. Our employees are empowered to explore their creativity, pursue their passions, and achieve personal growth through their work experience with us. Teal is committed to fostering an environment in the workplace that promotes diversity, equity, and inclusivity - where all employees are valued, respected, and provided with equal opportunities.

We are looking for an individual who:

  • Loves helping people
  • Is committed to excellence
  • Is forward thinking

Job Overview: Under the direction of the Director of Services, the Cybersecurity Engineer is experienced in managing cloud infrastructure, deploying/maintaining security monitoring solutions, automation, vulnerability management and other SecOps skills in compliance driven environments. In this role, the Cybersecurity Engineer is responsible for protecting our internal and external clients as a member of our high touch, customer centric team. The Cybersecurity Engineer will be exposed to many different technologies, compliance frameworks, and cybersecurity methodologies. As such, they will not be expected to know everything, but expected to be resourceful in finding solutions.

        Essential Functions

        • Perform security reviews, identify gaps in security architecture.

        • Verify that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations.

        • Support Security Analysts by performing incident response activities (containment and eradication) when escalation is needed.

        • Verify and update security documentation reflecting the application/system security design features.

        • Deploy, support, and manage Network Security Monitoring (NSM), Endpoint Detection and Response (EDR), and Vulnerability Management solutions.

        • Deploy, Manage, support, and secure compliance driven on-premises environments and cloud environments in Microsoft GCC High.

        • Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.

        • Perform remediation and remediation management on identified vulnerabilities in cloud and on-premises environments

        • Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.

        • Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).

        • Assess the effectiveness of security controls, implement security controls, and manage security controls

        • Assess all the configuration management (change configuration/release management) processes and support their management

        • Employ secure configuration management processes.

        • Deploy, manage, and support Network Access Control (NAC), Application Control, and Data Loss prevention solutions

        • Provide advice on project costs, design concepts, or design changes.

        • Provide input on security requirements to be included in statements of work and other appropriate procurement documents.

        • Translate proposed capabilities into technical requirements.

        • Configure and optimize network hubs, routers, and switches for security monitoring

        • Design and implement group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs.

        • Maintain baseline system security according to organizational policies.

        • Manage cybersecurity system/server resources including performance, capacity, availability, serviceability, and recoverability.

        • Apply security policies to meet security objectives of the system.

        • Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.

        • Implement specific cybersecurity countermeasures for systems and/or applications.

        • Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.

        • Coordinate with enterprise-wide cyber defense staff to validate network alerts.

        • Coordinate with Cyber Security Analysts to manage and administer the updating of rules and signatures (e.g., intrusion detection/protection systems, antivirus, and content blacklists) for specialized cyber defense applications.

        • Perform system administration on specialized cyber defense applications and systems (e.g., antivirus, audit and remediation) or Virtual Private Network (VPN) devices, to include installation, configuration, maintenance, backup, and restoration.

        • Build, install, configure, and test dedicated cyber defense hardware.

        • Create, edit, and manage network access control lists on specialized cyber defense systems (e.g., firewalls and intrusion prevention systems).

        • Identify potential conflicts with implementation of any cyber defense tools (e.g., tool and signature testing and optimization).

        • Employ approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness).

        • Deployment, Configuration, and support of Conditional Access Control (CAC) and Mobile Device Management (MDM) Solutions

        Additional Responsibilities

        • Support and adhere to our company’s core values.

        • Maintain professional appearance and conduct at all times.

        • Adheres to company work practices.

        • Establishes and maintains effective working relationships with colleagues, clients, vendors, and management.

        • Documents work processes as required.

        • Performs other duties as assigned.

        Qualifications

        • Minimum 5 years of paid experience in a similar role or roles that provide a significant overlap of skills required to perform day-to-day job functions.
        • Experience in Microsoft GCC High and GovCloud Environments and implementing security controls on those specific platforms, including conditional access control.
        • Must be a US Person as defined by 22 CFR § 120.62.
        • Experience in deployment, management, and configuration of NSM, MDR, EDR, XDR, UEM, MDM, NAC, Application Control, Phishing and Vulnerability Management solutions.
        • Expert Level understanding and application of networking principals in production environments
        • Expert Level understanding and application of Modern Operating system management and deployment methodologies.
        • Formal education or certifications that support and reinforce skills required for performance of day-day job duties.
        • Highly responsive.
        • Excellent oral and written communication skills. Ability to read/speak/write at a high level. The role requires high level written communication skills.
        • Ability to document work and maintain accurate records.
        • Resourceful – the ability to figure things out.
        • High attention to detail.
        • Maintain a professional appearance, demeanor, and team-oriented behavior; have mutual respect for management and team members; partner with others to create an exceptional experience for each and every client.
        • Punctual, dependable, goal oriented, and able to receive constructive coaching.
        • Adherence to all policies and procedures, including, but not limited to standards for safety, attendance, punctuality, and personal appearance.

        Benefits

        • Competitive salary and performance-based incentives.
        • Comprehensive benefits package, including paid time off, paid holidays, health, dental, vision, life insurance, disability, and retirement plans.
        • Ongoing professional development and training opportunities.
        • Collaborative and supportive work environment.
        • Opportunity to work with cutting-edge technologies and gain hands-on experience.

        The above is intended to describe the general content and requirements for the performance for this position. It is not to be construed as an exhaustive statement of duties, responsibilities or requirements.

        TEAL IS AN EQUAL OPPORTUNITY EMPLOYER

        Similar Jobs

        10 Days Ago
        Remote or Hybrid
        Georgia, USA
        100K-110K Annually
        Mid level
        100K-110K Annually
        Mid level
        Artificial Intelligence • Hardware • Information Technology • Security • Software • Cybersecurity • Big Data Analytics
        The role involves leading cybersecurity assessments, managing compliance discussions, identifying vulnerabilities, and delivering presentations to clients. Requires travel and technical knowledge of cybersecurity tools and practices.
        Top Skills: AcasDb ProtectIso 27001NessusNist 800-53R5Nist CsfWebinspect
        10 Days Ago
        Remote or Hybrid
        Georgia, USA
        100K-110K Annually
        Mid level
        100K-110K Annually
        Mid level
        Artificial Intelligence • Hardware • Information Technology • Security • Software • Cybersecurity • Big Data Analytics
        The Cybersecurity Engineer will conduct CMMC assessments, analyze cybersecurity documentation, identify risks, and participate in compliance discussions while operating in a remote environment.
        Top Skills: Cloud ComputingCmmcFedrampNist Sp 800-171Nist Sp 800-53
        6 Days Ago
        Remote or Hybrid
        USA
        120K-180K Annually
        Mid level
        120K-180K Annually
        Mid level
        Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
        As a Cryptography Engineer, you will design and maintain cryptographic solutions, manage TLS lifecycle, integrate HSMs, and automate cryptographic operations, while providing technical leadership and mentoring junior engineers.
        Top Skills: BashCryptographyGoHardware Security ModulesLinuxPythonTlsUnix

        What you need to know about the Chicago Tech Scene

        With vibrant neighborhoods, great food and more affordable housing than either coast, Chicago might be the most liveable major tech hub. It is the birthplace of modern commodities and futures trading, a national hub for logistics and commerce, and home to the American Medical Association and the American Bar Association. This diverse blend of industry influences has helped Chicago emerge as a major player in verticals like fintech, biotechnology, legal tech, e-commerce and logistics technology. It’s also a major hiring center for tech companies on both coasts.

        Key Facts About Chicago Tech

        • Number of Tech Workers: 245,800; 5.2% of overall workforce (2024 CompTIA survey)
        • Major Tech Employers: McDonald’s, John Deere, Boeing, Morningstar
        • Key Industries: Artificial intelligence, biotechnology, fintech, software, logistics technology
        • Funding Landscape: $2.5 billion in venture capital funding in 2024 (Pitchbook)
        • Notable Investors: Pritzker Group Venture Capital, Arch Venture Partners, MATH Venture Partners, Jump Capital, Hyde Park Venture Partners
        • Research Centers and Universities: Northwestern University, University of Chicago, University of Illinois Urbana-Champaign, Illinois Institute of Technology, Argonne National Laboratory, Fermi National Accelerator Laboratory

        Sign up now Access later

        Create Free Account

        Please log in or sign up to report this job.

        Create Free Account