What are the responsibilities and job description for the Cyber Engineer: Tier II position at Argent Financial Group?
Cyber Engineer: Tier II
Position Summary:
This role combines project management and cyber engineering responsibilities from day one, reporting directly to the CISO. Initial priority will be leading the enterprise implementation of commercial AI tools across the organization over an approximately 3–6 month engagement, including change management, user adoption, AI governance and policy work with third-party consultants and internal teams, and project delivery cadence and stakeholder reporting. In parallel, the individual will contribute to the Cyber Engineer function — partnering with third-party security vendors on the execution of the enterprise security practice, supporting audits, and assisting with daily operations across endpoint security, vulnerability management, compliance scanning, SIEM, and IDAM — with cyber responsibilities ramping up as the AI implementation approaches completion. Leading additional enterprise IT projects may also become a responsibility of this role over time.
Job Location:
Ruston, LA or Shreveport, LA (Hybrid will be considered as needed)
Essential Functions:
- Lead the enterprise implementation of commercial AI tools over an initial 3–6 month engagement, with pilots including Microsoft Copilot and Claude and the flexibility to pivot as tooling needs evolve
- Drive change management and user adoption strategies across business units
- Partner with third-party consultants and internal teams on AI governance, acceptable-use, and data-handling policies
- Run project delivery cadence, including stand-ups, milestone tracking, and stakeholder/executive reporting
- Lead additional enterprise IT projects as assigned over time, applying project management discipline to initiatives beyond the AI deployment
- Serve concurrently as a Tier 2 Cyber Engineer reporting directly to the CISO, with cyber workload ramping up as the AI implementation approaches completion
- Install, configure, and maintain CrowdStrike endpoint protection; review and apply policies; and ensure agent coverage and health in alignment with policy
- Conduct vulnerability scanning in coordination with the Patching Team, perform ad-hoc or rescans as necessary, and troubleshoot authentication issues
- Provide vulnerability reporting to multiple disciplines (Patching Team, Executive Leadership)
- Conduct compliance scans in coordination with the System Admin team
- Onboard data sources to the SIEM, perform data correlation and manipulation, and create and maintain alerts, dashboards, and reports in alignment with compliance requirements and corporate policies
- Partner with third-party security vendors on the implementation and execution of the enterprise security practice
- Support internal and external audits with evidence collection, control testing, and remediation tracking
- Maintain accurate documentation of incidents, solutions, projects, and IT inventory to ensure compliance with internal standards and policies
- Effectively troubleshoot security and technology issues, and perform research for resolution
- Actively engage in continuous learning, utilizing both self-driven research and employer-supported training to keep technical skills sharp and relevant
Additional Functions:
Other duties as assigned by management
Additional Duties and Responsibilities:
Performs any and all other duties assigned by supervisor for which the employee is qualified and physically able to perform with or without reasonable accommodation.
Qualification Requirements:
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
Education or Experience:
Bachelor’s degree in C.I.S., Computer Science, or a related field from an accredited college or university; or equivalent education/experience in the computer science, information technology, or cybersecurity field. 3–5 years of post-graduate experience in information technology, with a demonstrated combination of project management and cybersecurity responsibilities. Prior experience leading enterprise technology implementations and working with third-party consultants and vendors is required. Hands-on experience with endpoint protection (CrowdStrike), vulnerability scanning technologies, SIEM platforms, compliance scanning is desirable. Familiarity with NIST CSF / 800-53 and GLBA / FTC Safeguards is a plus. Experience with commercial AI platforms (e.g., Microsoft Copilot, Claude) and enterprise change management is preferred. CompTIA Security , (ISC)² SSCP, and/or CrowdStrike (e.g., CCFA) or other vendor certifications are preferred. No required travel; up to 5% may be expected.
Language Skills:
Ability to read and interpret documents such as safety rules, operating and maintenance instructions, and procedure manuals. Ability to speak effectively in one-on-one and small group situations.
Mathematical Skills:
Ability to apply common sense understanding to carry out instructions furnished in written, oral, or diagram form. Ability to deal with problems involving several variables in standardized situations.
Reasoning Ability:
Ability to define problems, collect data, establish facts, and draw valid conclusions. Ability to deal with a variety of abstract and practical problems.
Physical Demands:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential duties of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Sedentary work that involves sitting most of the time; employee exerts up to 50 pounds of force occasionally or a negligible amount of force frequently to loft, carry, push, pull or otherwise move objects. Walking and standing are infrequently required.
Clarity of vision at less than 20 inches, with or without correction.
Ability to clearly express or exchange ideas by means of the spoken word, and to receive detailed information through verbal communication, with or without correction.
Work Environment:
The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Inside work for the most part; normal office equipment. Employee may occasionally spend time outside the office; may drive a vehicle and be exposed to weather and temperature fluctuations.