Uvation

Job brief

We are looking to hire a security engineer with an analytical mind and a detailed understanding of cybersecurity methodologies. Servers-cloud-systems security engineers are expected to have meticulous attention to detail, outstanding problem-solving skills, work comfortably under pressure, and deliver on tight deadlines.

To ensure success, a security engineer must display an excellent understanding of technology infrastructures using Firewalls, VPN, Data Loss Prevention, IDS/IPS, Web-Proxy, and Security Audits. Top candidates will be comfortable working with a variety of technologies, security problems, and troubleshooting of the network.

Responsibilities & Duties

• Planning, implementing, managing, monitoring, and upgrading security measures for the protection of the organization's data, systems, and networks.

• Troubleshooting security and network problems.

• Responding to all system and/or network security breaches

• Someone who can find faults in the system and improve it as per their best of knowledge.

• Ensuring that the organization's data and infrastructure are protected by enabling the appropriate security controls.

• Participating in the change management process.

• Testing and identifying network and system vulnerabilities.

• Daily administrative tasks, reporting, and communication with the relevant departments in the organization.

Preferred skills and Qualifications

• A degree in computer science, IT, systems engineering, or related qualification.

• 5+ years of work experience with incident detection, incident response, and forensics.

• Experience with Firewalls (functionality and maintenance), Office 365 Security, VSX, and Endpoint Security.

• Certifications such as CISSP, GSEC, CEH or CISM desired

• Proficiency in Python, C++, Java, Ruby, Node, Go, and/or Power Shell.

• Ability to work under pressure in a fast-paced environment.

• Strong attention to detail with an analytical mind and outstanding problem-solving skills.

• Great awareness of cybersecurity trends and hacking techniques.