What are the responsibilities and job description for the Cyber Security Engineer position at Jobs via Dice?
Dice is the leading career destination for tech experts at every stage of their careers. Our client, Milestone Technologies, Inc., is seeking the following. Apply via Dice today!
100% Onsite, LONG BEACH, CA – Must currently live locally to Long Beach
6 Month, W2 (ONLY) contract - (No Sponsorship, OPTs, C2C or 3rd parties)
Estimated Rate: $65 - $70/hr.As a cyber security engineer, you will help the Information Technology Team take our current cyber security program to the next level. You will work closely with various teams within the IT group and across our organization to ensure we are remaining proactive and ensuring our software and systems are designed and implemented following best security practices. You will also be responsible for maintaining operational effectiveness of our terminal by mitigating risk all while increasing our security posture and protecting a part of the nation’s critical infrastructure.
How You Will Make an Impact:
Measure and analyze cyber security posture across the organization and recommend improvements and solutions to current cyber security issues and risks
Desktop Security:
100% Onsite, LONG BEACH, CA – Must currently live locally to Long Beach
6 Month, W2 (ONLY) contract - (No Sponsorship, OPTs, C2C or 3rd parties)
Estimated Rate: $65 - $70/hr.As a cyber security engineer, you will help the Information Technology Team take our current cyber security program to the next level. You will work closely with various teams within the IT group and across our organization to ensure we are remaining proactive and ensuring our software and systems are designed and implemented following best security practices. You will also be responsible for maintaining operational effectiveness of our terminal by mitigating risk all while increasing our security posture and protecting a part of the nation’s critical infrastructure.
- Top skills will be:
- Linux / 3 years’ experience– MUST HAVE THIS
- Threat Hunting
- Network Security (Fortinet, Cisco, Palo Alto, Juniper, etc.)
- Jira
- Qualys
- Desktop Hardening
- Threat Hunting
- Fortinet (Or similar - Palo Alto, etc.)
How You Will Make an Impact:
Measure and analyze cyber security posture across the organization and recommend improvements and solutions to current cyber security issues and risks
Desktop Security:
- Implement security policies and configurations for desktop and laptop environments (Windows, Linux etc.,).
- Perform regular security audits and system hardening to minimize vulnerabilities in desktop systems.
- Manage endpoint protection solutions such as antivirus/anti-malware software, EDR (Endpoint Detection & Response), and firewall configurations.
- Implement and enforce least-privilege access across all desktop environments.
- Manage user accounts and privileges, ensuring proper authentication protocols (e.g., MFA) are followed.
- Regularly audit user permissions to identify and mitigate potential security risks.
- Implement disk encryption and secure storage protocols to protect sensitive data on endpoint devices.
- Deploy and manage DLP solutions to prevent data breaches or unauthorized data transfers from desktop systems.
- Ensure compliance with regulatory and industry standards for data protection (e.g., GDPR, HIPAA).
- Manage and configure security tools like SIEM (e.g., Splunk, AlienVault), DLP (Data Loss Prevention), IDS/IPS, and vulnerability scanners.
- Ensure security tools are integrated properly into the enterprise IT environment and are functioning as intended.
- Regularly update and patch security tools to prevent exploitation of known vulnerabilities.
- Coordinate with IT teams to ensure timely patching of desktop operating systems and software.
- Use vulnerability management tools to identify weaknesses in the desktop ecosystem and implement remediation measures.
- Work closely with application and network security teams to ensure end-to-end protection for desktop users.
- Prepares and/or conducts written and oral reports and presentations
- Work in a 24/7 environment. Will at times require work over holidays and/or weekends
- Experience with Office 365/Advanced Threat Protection, MFA and Cisco DUO multi-factor authentication solutions
- Experience with virtualization and public cloud providers
- Familiarity with ITIL processes
- Strong oral and written communication & demonstrated team-work and collaboration skills
- Ideal candidates possess GIAC GCSA or equivalent certification
- Previous experience with Palo Alto firewalls / all versions of PANOS
- Previous experience with SPLUNK security software
- Previous experience with IoT and safeguarding OT equipment in an industrial setting.
- Experience in a maritime/transportation logistics environment
- BA/BS degree Computer Science, Engineering, Information Systems, or equivalent experience
- Minimum 5 years in Information Technology including at least 3-5 years' experience in an Information Security Engineering or similar capacity
Salary : $65 - $70