Teal (tealtech.com) Logo

Teal (tealtech.com)

Cybersecurity Engineer

Posted 7 Days Ago
Remote
Hiring Remotely in United States
100K-120K Annually
Senior level
Remote
Hiring Remotely in United States
100K-120K Annually
Senior level
The Cybersecurity Engineer protects clients by managing security monitoring solutions, vulnerability management, and compliance in cloud and on-premises environments.
The summary above was generated by AI

In 2023, TechGen and Aligned Technology Solutions, both award-winning Managed IT Service Providers, merged – forming the premier company of Teal. Teal is an advanced IT services that assists small- to medium-sized organizations in strategically leveraging their technology. With roots dating back to 2000, the company differentiates itself from its competition through world-class concierge service, business-focused support, and sophisticated cybersecurity and compliance knowledge. Our employees are empowered to explore their creativity, pursue their passions, and achieve personal growth through their work experience with us. Teal is committed to fostering an environment in the workplace that promotes diversity, equity, and inclusivity - where all employees are valued, respected, and provided with equal opportunities.

We are looking for an individual who:

  • Loves helping people
  • Is committed to excellence
  • Is forward thinking

Job Overview: Under the direction of the Director of Services, the Cybersecurity Engineer is experienced in managing cloud infrastructure, deploying/maintaining security monitoring solutions, automation, vulnerability management and other SecOps skills in compliance driven environments. In this role, the Cybersecurity Engineer is responsible for protecting our internal and external clients as a member of our high touch, customer centric team. The Cybersecurity Engineer will be exposed to many different technologies, compliance frameworks, and cybersecurity methodologies. As such, they will not be expected to know everything, but expected to be resourceful in finding solutions.

Location:

  • On-site in Minneapolis, MN

      Essential Functions

      • Perform security reviews, identify gaps in security architecture.

      • Verify that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations.

      • Support Security Analysts by performing incident response activities (containment and eradication) when escalation is needed.

      • Verify and update security documentation reflecting the application/system security design features.

      • Deploy, support, and manage Network Security Monitoring (NSM), Endpoint Detection and Response (EDR), and Vulnerability Management solutions.

      • Deploy, Manage, support, and secure compliance driven on-premises environments and cloud environments in Microsoft GCC High.

      • Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.

      • Perform remediation and remediation management on identified vulnerabilities in cloud and on-premises environments

      • Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.

      • Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).

      • Assess the effectiveness of security controls, implement security controls, and manage security controls

      • Assess all the configuration management (change configuration/release management) processes and support their management

      • Employ secure configuration management processes.

      • Deploy, manage, and support Network Access Control (NAC), Application Control, and Data Loss prevention solutions

      • Provide advice on project costs, design concepts, or design changes.

      • Provide input on security requirements to be included in statements of work and other appropriate procurement documents.

      • Translate proposed capabilities into technical requirements.

      • Configure and optimize network hubs, routers, and switches for security monitoring

      • Design and implement group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs.

      • Maintain baseline system security according to organizational policies.

      • Manage cybersecurity system/server resources including performance, capacity, availability, serviceability, and recoverability.

      • Apply security policies to meet security objectives of the system.

      • Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.

      • Implement specific cybersecurity countermeasures for systems and/or applications.

      • Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.

      • Coordinate with enterprise-wide cyber defense staff to validate network alerts.

      • Coordinate with Cyber Security Analysts to manage and administer the updating of rules and signatures (e.g., intrusion detection/protection systems, antivirus, and content blacklists) for specialized cyber defense applications.

      • Perform system administration on specialized cyber defense applications and systems (e.g., antivirus, audit and remediation) or Virtual Private Network (VPN) devices, to include installation, configuration, maintenance, backup, and restoration.

      • Build, install, configure, and test dedicated cyber defense hardware.

      • Create, edit, and manage network access control lists on specialized cyber defense systems (e.g., firewalls and intrusion prevention systems).

      • Identify potential conflicts with implementation of any cyber defense tools (e.g., tool and signature testing and optimization).

      • Employ approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness).

      • Deployment, Configuration, and support of Conditional Access Control (CAC) and Mobile Device Management (MDM) Solutions

      Additional Responsibilities

      • Support and adhere to our company’s core values.

      • Maintain professional appearance and conduct at all times.

      • Adheres to company work practices.

      • Establishes and maintains effective working relationships with colleagues, clients, vendors, and management.

      • Documents work processes as required.

      • Performs other duties as assigned.

      Qualifications

      • Minimum 5 years of paid experience in a similar role or roles that provide a significant overlap of skills required to perform day-to-day job functions.
      • Experience in Microsoft GCC High and GovCloud Environments and implementing security controls on those specific platforms, including conditional access control.
      • Must be a US Person as defined by 22 CFR § 120.62.
      • Experience in deployment, management, and configuration of NSM, MDR, EDR, XDR, UEM, MDM, NAC, Application Control, Phishing and Vulnerability Management solutions.
      • Expert Level understanding and application of networking principals in production environments
      • Expert Level understanding and application of Modern Operating system management and deployment methodologies.
      • Formal education or certifications that support and reinforce skills required for performance of day-day job duties.
      • Highly responsive.
      • Excellent oral and written communication skills. Ability to read/speak/write at a high level. The role requires high level written communication skills.
      • Ability to document work and maintain accurate records.
      • Resourceful – the ability to figure things out.
      • High attention to detail.
      • Maintain a professional appearance, demeanor, and team-oriented behavior; have mutual respect for management and team members; partner with others to create an exceptional experience for each and every client.
      • Punctual, dependable, goal oriented, and able to receive constructive coaching.
      • Adherence to all policies and procedures, including, but not limited to standards for safety, attendance, punctuality, and personal appearance.

      Benefits

      • Competitive salary and performance-based incentives.
      • Comprehensive benefits package, including paid time off, paid holidays, health, dental, vision, life insurance, disability, and retirement plans.
      • Ongoing professional development and training opportunities.
      • Collaborative and supportive work environment.
      • Opportunity to work with cutting-edge technologies and gain hands-on experience.

      The above is intended to describe the general content and requirements for the performance for this position. It is not to be construed as an exhaustive statement of duties, responsibilities or requirements.

      TEAL IS AN EQUAL OPPORTUNITY EMPLOYER

      Top Skills

      Application Control
      Cloud Infrastructure
      Edr
      Govcloud
      Mdm
      Mdr
      Microsoft Gcc High
      Nac
      Nsm
      Uem
      Vulnerability Management
      Xdr

      Similar Jobs

      19 Days Ago
      Remote or Hybrid
      Illinois, USA
      90K-100K Annually
      Mid level
      90K-100K Annually
      Mid level
      Artificial Intelligence • Hardware • Information Technology • Security • Software • Cybersecurity • Big Data Analytics
      As a Cybersecurity Engineer, lead security assessments for client systems, ensure compliance with FedRAMP, FISMA, and NIST RMF, and mentor team members in secure cloud architecture.
      Top Skills: AcasDb ProtectDisa Stigs/Stig ViewerNessusNmapWebinspect
      3 Days Ago
      Remote
      United States
      123K-167K Annually
      Mid level
      123K-167K Annually
      Mid level
      Software
      The Cybersecurity Engineer will lead the RMF accreditation process, develop cybersecurity policies, conduct risk assessments, and integrate security measures in DoD environments. They will collaborate with teams, perform security testing, and maintain compliance documentation while staying updated on cybersecurity threats and best practices.
      Top Skills: AcasAWSAzureCi/CdConfiguration As CodeGCPGitopsHelmInfrastructure As CodeKubernetesKustomizeNist-800 SeriesRmfSecurity Assessment ToolsStigsTerraformVulnerability Scanning
      10 Days Ago
      Remote
      USA
      106K-115K Annually
      Mid level
      106K-115K Annually
      Mid level
      Information Technology • Consulting
      The Cybersecurity Engineer will design and manage security solutions, assess vulnerabilities, develop incident response plans, monitor security alerts, and document procedures to safeguard digital assets.
      Top Skills: EncryptionEndpoint ProtectionFedrampFirewallsFismaIcd 503Intrusion DetectionNist Sp 800-53Rmf

      What you need to know about the Boston Tech Scene

      Boston is a powerhouse for technology innovation thanks to world-class research universities like MIT and Harvard and a robust pipeline of venture capital investment. Host to the first telephone call and one of the first general-purpose computers ever put into use, Boston is now a hub for biotechnology, robotics and artificial intelligence — though it’s also home to several B2B software giants. So it’s no surprise that the city consistently ranks among the greatest startup ecosystems in the world.

      Key Facts About Boston Tech

      • Number of Tech Workers: 269,000; 9.4% of overall workforce (2024 CompTIA survey)
      • Major Tech Employers: Thermo Fisher Scientific, Toast, Klaviyo, HubSpot, DraftKings
      • Key Industries: Artificial intelligence, biotechnology, robotics, software, aerospace
      • Funding Landscape: $15.7 billion in venture capital funding in 2024 (Pitchbook)
      • Notable Investors: Summit Partners, Volition Capital, Bain Capital Ventures, MassVentures, Highland Capital Partners
      • Research Centers and Universities: MIT, Harvard University, Boston College, Tufts University, Boston University, Northeastern University, Smithsonian Astrophysical Observatory, National Bureau of Economic Research, Broad Institute, Lowell Center for Space Science & Technology, National Emerging Infectious Diseases Laboratories

      Sign up now Access later

      Create Free Account

      Please log in or sign up to report this job.

      Create Free Account