×
Register Here to Apply for Jobs or Post Jobs. X

Info Security Engineer

Job in Cedar Rapids, Linn County, Iowa, 52404, USA
Listing for: UFG Insurance
Full Time position
Listed on 2025-12-25
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant, Network Security
Salary/Wage Range or Industry Benchmark: 100000 - 125000 USD Yearly USD 100000.00 125000.00 YEAR
Job Description & How to Apply Below

UFG is currently hiring for an Information Security Engineer who will play a critical role in designing, implementing, and maintaining technical security controls that protect UFG’s systems, data, and infrastructure. This position is responsible for hands‑on configuration, monitoring, and support of security technologies, working across cloud and on‑prem environments to enforce security standards and ensure regulatory compliance.

Operating as a subject matter expert within the Information Security team, the engineer collaborates with architecture, infrastructure, and application teams to embed security into systems and processes. The role supports initiatives ranging from vulnerability management and endpoint protection to identity governance and incident response—helping to ensure the confidentiality, integrity, and availability of enterprise systems.

Essential Duties and Responsibilities:

Security Monitoring, and Incident Response

  • Serves as team subject matter expert in the regular review and analysis of security logs, system alerts, and network traffic to detect, investigate, and mitigate security threats and anomalies.
  • Develop, implement, and refine incident response plans for rapid, effective cybersecurity event management.
  • Create and implement high value detections unique to our enterprise environment.
  • Leads and supports Information Technology team members with risk analysis of identified issues or events and perform investigations to uncover additional facts surrounding the event with limited direction.
  • Review, analyze, triage, and respond to phishing submissions and alerts.
  • Lead risk assessments, vulnerability scans, and remediation efforts across infrastructure and applications.
  • Participate in disaster recovery and business continuity planning and testing
  • Operates as a senior member of a 24/7 on call team, responding to incidents and leading the team as necessary.

Security Administration

  • Serve as subject matter expert in the administration of critical security and operational tools to ensure system operation and availability including firewalls, vulnerability management, deception technology, SIEM, EDR, SSO, PAM, CASB SE, and others as necessary.
  • Provide Level 3 technical support and serve as subject matter expert in troubleshooting security team products.
  • Design, develop, and implement new security solutions and system enhancements to address emerging threats and improve operational efficiency.
  • Monitor, test, and continually improve security practices in place for network, system, applications, and operations management, providing guidance for junior team members in this role.
  • Coordinate and lead vendor relationships regarding security system updates, and technical support.
  • Identify opportunities to improve work processes and automate improvements to make them more effective and strengthen security measures.
  • Collaborates with IT and business partners to ensure security is factored into the evaluation, selection, installation, and configuration of hardware, software, and infrastructure.

Threat Intelligence, Threat Analysis, and Risk Mitigation

  • Lead in‑depth analysis of cyber threats—including malware, phishing campaigns, and other attack vectors—to identify patterns, indicators of compromise (IOCs), and adversary tactics, techniques, and procedures (TTPs).
  • Aggregate and evaluate threat intelligence from diverse sources such as open‑source intelligence tools (OSINT) and commercial feeds to identify relevant and actionable insights for the organization.
  • Collaborate closely with business and IT personnel in a complex information technology environment to support proactive threat identification, risk mitigation, and incident response efforts.
  • Stay current with and remain knowledgeable about new threats. Analyze attacker tactics, techniques and procedures (TTPs) from security events across our network of security devices and end‑user systems
  • Monitor emerging security threats and identify vulnerabilities in current or proposed systems and processes.

Policy Development, Metric Management, and Compliance

  • Participate in the development and enforcement of IT security policies, standards, procedures, and compliance…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary