Cybersecurity Engineer

Ucor ManagementOak Ridge, TN
382d$104,000 - $166,000Onsite

About The Position

The Cybersecurity Engineer at UCOR is responsible for developing and implementing security best practices across the organization. This role involves identifying and mitigating vulnerabilities, managing user access, and responding to cyber threats to protect sensitive data and ensure the integrity of the company's information systems.

Requirements

  • Bachelor's degree in Information Technology or other relevant discipline and 12+ years of experience in IT
  • OR Associate's degree or technical diploma/degree in Information Technology and 16+ years of relevant experience in IT
  • OR 20+ years of Enterprise level IT experience in administration, support and/or oversight capacity
  • Technical knowledge of networking and system administration
  • Technical knowledge of network security control including Virtual Private Networks (VPNs)
  • Technical knowledge of Cloud Security, Internet of Things (IoT), and Artificial Intelligence (AI) Security
  • Technical knowledge of operating systems and virtual machines - including Windows and Linux
  • Familiarity with programming languages
  • Familiarity with tools used in cybersecurity, such as OpenSSL and GPG
  • Basic understanding of cryptography techniques
  • Analytical skills and attention to detail
  • Ethical mindset
  • Ability to adapt to new technologies and security threats
  • Comprehensive knowledge of the cybersecurity foundation, including risk management, laws, orders, and regulations
  • Basic knowledge of penetration testing
  • Ability to articulate ideas and write clear and concise reports

Responsibilities

  • Develop systems and processes for security best practices throughout the company
  • Develop security plans and provide suggestions and best data security practices
  • Find and fix vulnerabilities before they can be exploited by an attacker
  • Detect threats, analyze vulnerabilities, respond to attacks, and recover from security breaches
  • Manage user authentication and access to ensure authorized users have access while keeping intruders out
  • Protect against data breaches by securing the network that connects data and applications
  • Use cyber threat intelligence to detect cyber threats and prevent confidential information from leaking
  • Secure data in transit, storage, and processing to protect sensitive data from unauthorized access
  • Identify, contain, and resolve cybersecurity incidents to minimize damage and reduce response time
  • Apply security updates to vulnerabilities to reduce the risk of cyberattacks
  • Examine risks to the security of the organization's information systems, devices, and data and prioritize potential threats
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service