Overview
Cybersecurity Engineer | Full Time | Days | Hybrid Position
2 days ago Be among the first 25 applicants
This position will be a hybrid position.
Summary : Under the general direction of the Chief Information Security Officer, the cybersecurity engineer is responsible for designing, implementing, and maintaining security measures that protect the organization's computer systems, networks, and data. The role safeguards confidentiality, integrity, and availability across the enterprise by defending against security breaches, cyber threats, and attacks.
Education
Bachelor's degree (B.S) or equivalent; or 5 to 7 years related experience and / or training; or equivalent combination of education and experience.
Experience
- Experience in IT roles such as systems or network administration.
- Experience working as a security analyst or in a security operations center (SOC).
- Strong understanding of concepts such as network segmentation, zero-trust, and SASE.
- Experience configuring and managing next generation firewalls, preferably Palo Alto.
- Knowledge of tools like Nmap, Nessus, Wireshark, and Metasploit for network scanning and vulnerability testing.
- Experience with Linux, Windows, and Mac OS.
- Understanding of encryption technologies, certificates, and secure key management.
- Experience in responding to security breaches or incidents, developing incident response playbooks, and performing forensic analysis.
- Experience assessing risks, conducting threat assessments, and implementing mitigation strategies.
- Preferred security certifications such as CISSP, CISM or equivalent.
Competencies
Analytical : Synthesizes complex information; researches data; applies experience to complement data.Problem Solving : Identifies and resolves problems promptly; analyzes information; develops alternatives; collaborates effectively.Project Management : Plans, coordinates, communicates progress, and manages projects to completion within scope and budget.Technical Skills : Continuously builds knowledge; shares expertise with others.Customer Service : Responds to customer needs; seeks feedback to improve service; meets commitments.Interpersonal Skills : Maintains confidentiality; listens; manages emotions; open to others' ideas.Oral Communication : Delivers clear, persuasive communication; engages in meetings and discussions.Written Communication : Communicates clearly in writing; edits for clarity and accuracy; presents data effectively.Teamwork : Builds positive team spirit; supports shared goals; contributes to group success.Change Management : Plans and communicates changes; supports affected individuals; evaluates results.Leadership : Demonstrates confidence, inspires others, accepts feedback, and recognizes contributions.Ethics : Demonstrates integrity and respect; upholds organizational values.Organizational Support : Follows policies and completes administrative tasks accurately and on time.Safety and Security : Follows safety procedures and reports unsafe conditions.Adaptability : Adapts to changes and manages competing demands.Dependability : Follows instructions and commitments; manages priorities; communicates alternative plans as needed.Responsibilities
Analyze and respond to security threats from Firewall (FW), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Antivirus (AV), Endpoint Detection and Response (EDR), and other security threat data sources.Determine if security events should be escalated to incidents and follow all applicable incident response, reporting processes, and procedures.Assist in vulnerability assessments, risk analysis, and penetration testing to identify security weaknesses and recommend mitigation strategies.Manage security infrastructure, including firewalls, IDS / IPS, encryption protocols, and security information and event management (SIEM) tools.Assist with designing technical solutions to address cyber and network security challenges and work with other IT teams to implement and support them.Identify misuse, malware, or unauthorized activity on monitored networks.Collaborate with IT teams to ensure security patches and updates are applied promptly and correctly.Maintain an expert understanding of vulnerabilities, response, and mitigation strategies used to support cybersecurity operations.Keep up to date with the latest security and technology developments and evaluate emerging threats and mitigation approaches.Equal Employment Opportunity
Concord Hospital is an Equal Employment Opportunity employer. It is our policy to provide equal opportunity to all employees and applicants and to prohibit discrimination based on race, color, religion, sex, sexual orientation, gender, gender identity, national origin, age, marital status, genetic information, disability or protected veteran status.
Know Your Rights : Workplace Discrimination is Illegal. Applicants to and employees of this company are protected under federal law from discrimination on several bases. If you require a reasonable accommodation to complete any part of the application process, contact Human Resources at 603-230-7269.
Physical and Work Requirements
The physical demands and characteristics of the work environment are representative of those that will be encountered by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. The role is sedentary; regular light lifting may be required. The role may involve hearing, speaking, repetitive motion, fine motor skills, reaching, and sitting. Visual requirements include near vision. The noise level is usually quiet.
J-18808-Ljbffr