Cybersecurity Engineer
Listed on 2026-02-23
-
IT/Tech
Cybersecurity, Systems Engineer
In 2023, Tech Gen and Aligned Technology Solutions, both award-winning Managed IT Service Providers, merged – forming the premier company of Teal. Teal is an advanced IT services that assists small- to medium-sized organizations in strategically leveraging their technology. With roots dating back to 2000, the company differentiates itself from its competition through world‑class concierge service, business‑focused support, and sophisticated cybersecurity and compliance knowledge.
Our employees are empowered to explore their creativity, pursue their passions, and achieve personal growth through their work experience with us. Teal is committed to fostering an environment in the workplace that promotes diversity, equity, and inclusivity - where all employees are valued, respected, and provided with equal opportunities.
We are looking for an individual who:
- Loves helping people
- Is committed to excellence
- Is forward thinking
Under the direction of the Director of Services, the Cybersecurity Engineer is experienced in managing cloud infrastructure, deploying/maintaining security monitoring solutions, automation, vulnerability management and other Sec Ops skills in compliance driven environments. In this role, the Cybersecurity Engineer is responsible for protecting our internal and external clients as a member of our high touch, customer centric team. The Cybersecurity Engineer will be exposed to many different technologies, compliance frameworks, and cybersecurity methodologies.
As such, they will not be expected to know everything, but expected to be resourceful in finding solutions.
- Perform security reviews, identify gaps in security architecture.
- Verify that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations.
- Support Security Analysts by performing incident response activities (containment and eradication) when escalation is needed.
- Verify and update security documentation reflecting the application/system security design features.
- Deploy, support, and manage Network Security Monitoring (NSM), Endpoint Detection and Response (EDR), and Vulnerability Management solutions.
- Deploy, Manage, support, and secure compliance driven on‑premises environments and cloud environments in Microsoft GCC High.
- Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
- Perform remediation and remediation management on identified vulnerabilities in cloud and on‑premises environments.
- Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.
- Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).
- Assess the effectiveness of security controls, implement security controls, and manage security controls.
- Assess all the configuration management (change configuration/release management) processes and support their management.
- Employ secure configuration management processes.
- Deploy, manage, and support Network Access Control (NAC), Application Control, and Data Loss prevention solutions.
- Provide advice on project costs, design concepts, or design changes.
- Provide input on security requirements to be included in statements of work and other appropriate procurement documents.
- Translate proposed capabilities into technical requirements.
- Configure and optimize network hubs, routers, and switches for security monitoring.
- Design and implement group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs.
- Maintain baseline system security according to organizational policies.
- Manage cybersecurity system/server resources including performance, capacity, availability, serviceability, and recoverability.
- Apply security policies to meet security objectives of the system.
- Ensure that cybersecurity‑enabled products or other compensating security control technologies reduce identified…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).