Security Engineer 2 - Cyber Security

WesBanco Bank, Inc.Ann Arbor, MI

About The Position

This position is responsible for design, planning, and implementation of in-house and cloud-based information systems, and enterprise software architectures that support the bank’s information security operations functions. This role performs feedback and recommendation in the evaluation and selection of technologies, ensuring confidentiality, integrity, availability of data, and alignment with the standards of the bank. The position serves as a technical resource for security engineering initiatives, applying advanced knowledge to evaluate, build, and deliver solutions that enhance the security posture of the organization.

Requirements

  • Banking is a highly regulated industry and you will be expected to acquire and maintain a proficiency in the Bank's policies and procedures, and adhere to all laws, rules and regulations that are applicable to your conduct and the work you will be performing. You will also be expected to complete all assigned compliance training in a timely manner.
  • Ability to read, analyze and interpret general business periodicals, professional journals, technical procedures or governmental regulations.
  • Ability to write reports, business correspondence and procedure manuals.
  • Ability to effectively present information and respond to questions from groups of managers, clients, customers and the general public.
  • Ability to work with mathematical concepts such as probability and statistical inference, fundamentals of plane and solid geometry and trigonometry.
  • Ability to apply concepts such as fractions, percentages, ratios and proportions to practical situations.
  • Ability to solve practical problems and deal with a variety of concrete variables in situations where only limited standardization exists.
  • Ability to interpret a variety of instructions furnished in written, oral, diagram or schedule form.
  • Advanced level of knowledge and understanding of networking and communication technologies, including TCP/IP protocol, remote access methods, firewalls and wireless protocols.
  • Bachelor’s degree in Information Security or other computer-related field, and four years of related experience; or equivalent combination of education and/or experience.
  • Professional level knowledge of common network protocols utilized on corporate networks.
  • Professional level knowledge of at least three of the following technologies: Networking infrastructure products (routers, switches, wireless), Windows Operating Systems, Security infrastructure products (firewalls, intrusion prevention systems, content filtering), Virtualized infrastructure (Citrix, VMware, Nutanix), Cloud administration and security (Azure, AWS – Amazon Web Services) required.
  • Experience in an environment with change management processes.

Nice To Haves

  • Experience with end-point security best practices leveraging NIST, CIS or Microsoft standards preferred.
  • Certifications related to system architecture, design, and administration (Microsoft, Cisco, Vmware) are preferred.
  • Certifications related to security operations (EC-Council, CompTIA) are a plus.
  • Experience with cloud administration and security in Azure and/or AWS is preferred.

Responsibilities

  • Engineers and implements new security designs and solutions and report to Information Technology security management.
  • Architects, engineers, and deploys advanced security solutions across the enterprise, providing expert-level guidance and reporting outcomes to Information Technology security leadership.
  • Assists Security Analysts as an escalation point for security alerts, events, and logs, escalating findings appropriately to senior management.
  • Designs, implements, and optimizes technical controls to mitigate vulnerabilities, leveraging both existing and emerging security technologies.
  • Recommends and tests system hardening standards for new and existing network attached platforms and applications, ensuring compliance through structured assessments and detailed reporting.
  • Oversees lifecycle management for security platforms and infrastructure, including advanced configuration, troubleshooting, optimization, and update deployment for security technologies and supporting systems.
  • Contributes to the development, enhancement, and enforcement of enterprise security policies, standards, and procedures, ensuring alignment with industry best practices and regulatory requirements.
  • Produces advanced technical and executive-level reports detailing assessment outcomes, risk findings, security posture, and recommended remediation strategies.
  • Leads tuning, configuration optimization, and policy enhancements for critical security platforms—including firewalls, IPS/IDS, host‑based firewalls, application control technologies, and SIEM platforms—in collaboration with respective IT teams.
  • Delivers ongoing reporting and analysis to Information Technology security leadership regarding enterprise security posture, threat trends, and control effectiveness.
  • Performs advanced monitoring, analysis, and tracking of application and system vulnerabilities; validate severity, prioritize risk, and guide remediation planning in conjunction with Threat Intelligence and respective IT teams.
  • Tracks, analyzes, and reports on enterprise patch and configuration compliance, identifying gaps and working with Threat Intelligence and system owners to drive remediation and continuous improvement.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service