Security Engineer II

Expand EnergyOklahoma City, OK
8d

About The Position

Our core values — Stewardship, Character, Collaborate, Learn, Disrupt — are the lens through which we evaluate every business decision. As a dynamic, growing company that offers extremely competitive compensation and benefits, our employees are our most valued assets and the foundation of Expand's performance among our E&P competitors. We seek applicants from all backgrounds to ensure we get the best, most creative talent on our team. We realize that, historically, underrepresented groups feel the need to be 100% qualified in order to apply. If you meet any combination of our requirements, we encourage you to apply. We strive to hire people from a wide variety of backgrounds, not just because it’s the right thing to do, but because it makes our company stronger.  Job SummaryThis intermediate‑level position is responsible for designing, implementing, and supporting cybersecurity technologies and controls under general supervision. The role contributes to the planning, installation, operation, and maintenance of security systems that protect the organization’s information assets, networks, and infrastructure.

Requirements

  • Intermediate knowledge of cybersecurity principles, network defense, and security technologies
  • Basic understanding of network technology and how it relates to security architecture
  • Intermediate knowledge of common operating systems, system internals, and security controls
  • Ability to analyze problems, evaluate solution options, and implement secure configurations
  • Knowledge of project management methodologies and change‑control processes
  • Strong written and verbal communication skills, with the ability to work across technical and non‑technical teams
  • Minimum: High school diploma or GED
  • Minimum: 2 - 5 years of related cybersecurity, network security, or IT security experience

Nice To Haves

  • Preferred: Bachelor’s degree - from accredited university - IT, MIS, Computer Science, Cybersecurity, or related field
  • CompTIA Security+
  • CompTIA CySA+
  • CompTIA PenTest+
  • GIAC Security Essentials (GSEC)
  • GIAC Certified Incident Handler (GCIH)
  • Certified Ethical Hacker (CEH)
  • Microsoft SC‑200 or SC‑300
  • (ISC)² SSCP
  • (ISC)² CISSP (Associate or full certification)
  • Certified Cloud Security Professional (CCSP)

Responsibilities

  • Supports the planning, provisioning, installation, and enhancement of cybersecurity systems, including SIEM platforms, endpoint security tools, IAM/PAM solutions, and network security appliances
  • Implements, configures, and maintains security controls in alignment with organization policies, industry standards, and regulatory requirements
  • Performs security monitoring, threat analysis, and incident response, including alert triage, investigation, containment, and documentation
  • Deploys, configures, and maintains security infrastructure, such as IDS/IPS, vulnerability scanners, EDR tools, and logging systems
  • Conducts vulnerability assessments and system hardening efforts, collaborating with IT teams to remediate findings and support patch management processes
  • Diagnoses and resolves security‑related hardware, software, and configuration issues, using established procedures and forensics methodologies where appropriate
  • Implements measures to protect data, applications, and systems, including encryption, access controls, secure configuration baselines, and network segmentation
  • Maintains accurate security documentation, including architecture diagrams, configuration standards, incident timelines, and maintenance procedures
  • Collaborates with vendors and internal stakeholders for tool deployment, upgrades, integrations, and troubleshooting
  • Identifies opportunities to enhance security posture, reduce risk, automate controls, and improve technology workflows
  • Provides security guidance to IT project teams and business partners, ensuring secure design principles and compliance requirements are met
  • Supports audits, compliance reviews, and risk assessments by providing clear documentation and technical expertise
  • Performs other cybersecurity‑related duties as assigned
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service