Cybersecurity Engineer; EDR
Listed on 2026-02-16
-
IT/Tech
Cybersecurity, Systems Engineer
Job Summary
Cybersecurity Engineer (EDR) – 6 month contract – 100% remote. Must be GCH or USC. No C2C permitted.
OverviewThe Cybersecurity team designs, implements, and supports next‑generation security solutions, systems, and platforms that protect enterprise environments and affiliated business units. This role operates in a fast‑paced, collaborative environment and supports security technologies that must remain agile while meeting regulatory and security framework requirements.
Candidates should have hands‑on experience supporting core infrastructure operating systems, host compliance controls, file integrity monitoring, and advanced malware defense technologies. Working knowledge of IBM AIX, Red Hat Enterprise Linux, macOS, and Windows Enterprise environments is required.
Essential FunctionsThe essential functions listed represent the primary responsibilities of this role. Additional duties may be assigned. This role will support the migration of multiple business units to a next‑generation SIEM platform, including Crowd Strike‑based security solutions.
- Research, evaluate, validate, and recommend security technologies
- Support build, test, and implementation activities for enterprise security solutions
- Coordinate with vendors and service providers supporting security tools and platforms
- Manage system and application configurations, policies, and operational activities for assigned security solutions
- Monitor, report on, and optimize performance of security technologies
- Provide incident response and problem management for security technology issues
- Troubleshoot software and hardware failures and perform remediation to restore service
- Track and follow up on security work requests, coordinating with other IT teams to ensure timely resolution and approvals
- Support escalations, known issues, and out‑of‑cycle requests across multiple security platforms
- Develop and maintain operational documentation including procedures, diagrams, and knowledge articles
- Collect, analyze, and present security data and metrics to peers, leadership, and stakeholders
- Assist with migration, upgrade, and decommissioning of security technologies, including risk and impact analysis
- Collaborate with cross‑functional teams to deliver security initiatives
- Support continuous testing, validation, and gap analysis for security hardening efforts
- Align solutions with established security architecture standards and published reference designs
- Support disaster recovery planning, implementation, and testing for security platforms
- Assist with remediation activities resulting from audits, threat assessments, and vulnerability findings
- Provide training and knowledge transfer on security tools, processes, and procedures
- Basic knowledge of TCP/IP networking
- Ability to work independently while knowing when to seek guidance
- Foundational understanding of security controls across network, application, and operating system layers
- Experience or knowledge of vulnerability management and patching processes
- Strong technical, analytical, and administrative skills
- Strong documentation and review discipline
- Proven problem solving ability
- Professional demeanor with strong written and verbal communication skills
- High level of motivation and passion for technology
- Ability to learn new technologies quickly
- Strong solution design mindset to address security capability gaps
- Team oriented with a sense of ownership and accountability
- 4 or more years of related professional experience
- 2 or more years in cybersecurity
- 2 or more years in IT infrastructure or systems operations
- Bachelor’s degree in a related field or equivalent relevant work experience
Certification required at time of submission. Certification number must be included on the resume.
- SSCP or CISSP
Contractors must hold a relevant cybersecurity or technical certification. If a qualifying certification is not held, one must be obtained within six months of hire. Specific certification requirements will be defined by the hiring manager.
Preferred Qualifications- Exposure to project management methodologies such as Waterfall, Agile, Lean, or SAFe
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).