Cyber Security Engineer
Listed on 2025-12-07
-
IT/Tech
Cybersecurity, Information Security
The Cybersecurity Engineer is responsible for the technical implementation and management of cybersecurity measures. This role involves extensive hands‑on work with security technologies, developing and maintaining security protocols, and ensuring the protection of sensitive data. The Cybersecurity Engineer collaborates within the various IT teams to integrate security solutions into business projects and solutions, while supporting overall compliance with HIPAA regulations.
Technical Implementation- Architect, deploy, and maintain enterprise‑grade security technologies, including firewalls, intrusion detection/prevention systems, encryption platforms, and vulnerability management tools.
- Implement and support security controls for network infrastructure such as routers, switches, and wireless access points.
- Configure, administer, and secure Active Directory and Azure AD environments.
- Deploy and oversee endpoint protection platforms and Security Information and Event Management (SIEM) solutions.
- Manage Microsoft 365 security capabilities, including conditional access, data loss prevention (DLP), and advanced threat protection.
- Evaluate, test, and recommend new security tools, processes, and technologies to strengthen the organization’s security posture.
- Continuously monitor systems for security events, investigate alerts, and respond to incidents with appropriate documentation.
- Perform ongoing risk assessments and vulnerability scans to identify exposures and drive remediation efforts.
- Lead technical response efforts during security incidents or breaches in coordination with the incident response team.
- Administer and monitor Identity and Access Management (IAM) systems to ensure secure and appropriate access.
- Conduct routine vulnerability assessments and threat analysis to support continual improvement.
- Perform digital forensics and incident response activities as needed.
- Ensure adherence to HIPAA and all applicable regulatory and security standards.
- Design and implement technical safeguards that protect sensitive information and support organizational objectives.
- Partner with IT and business teams to embed security controls into systems, applications, and workflows.
- Educate and support staff on cybersecurity awareness, best practices, and evolving threats.
- Create and maintain accurate documentation for security configurations, procedures, and incident activity.
- Remain informed on current cybersecurity trends and recommend enhancements to existing controls.
- Plan and conduct scheduled and ad‑hoc security audits to validate adherence to security policies and standards.
- Develop, review, and update security policies and standards in alignment with industry best practices and regulatory requirements.
- Configure, troubleshoot, and maintain security‑related hardware and software.
- Implement and manage monitoring tools to detect intrusions and potential security breaches.
- Support the planning, execution, and ongoing refinement of the organization’s information security strategy.
- Adhere to organizational policies, procedures, and safety standards; complete required training annually; contribute to performance goals and quality improvement initiatives.
- Perform additional duties as assigned.
Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related discipline required.
Ten (10) years of overall IT experience, including at least five (5) years of hands‑on cybersecurity leadership with demonstrated success designing, engineering, and deploying security solutions in an enterprise environment.
CertificationsRelevant industry certifications such as CISSP, CISM, CISA, CCSP, CEH, Microsoft Azure Engineer, or equivalent are required.
Seniority levelMid‑Senior level
Employment typeFull‑time
Job functionInformation Technology
IndustriesHospitals and Health Care
Benefits- Medical insurance
- Vision insurance
- 401(k)
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).