×
Register Here to Apply for Jobs or Post Jobs. X

Cybersecurity Engineer

Job in Minneapolis, Hennepin County, Minnesota, 55400, USA
Listing for: Tealtech
Full Time position
Listed on 2026-02-23
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below

In 2023, Tech Gen and Aligned Technology Solutions, both award-winning Managed IT Service Providers, merged – forming the premier company of Teal. Teal is an advanced IT services that assists small- to medium-sized organizations in strategically leveraging their technology. With roots dating back to 2000, the company differentiates itself from its competition through world‑class concierge service, business‑focused support, and sophisticated cybersecurity and compliance knowledge.

Our employees are empowered to explore their creativity, pursue their passions, and achieve personal growth through their work experience with us. Teal is committed to fostering an environment in the workplace that promotes diversity, equity, and inclusivity - where all employees are valued, respected, and provided with equal opportunities.

We are looking for an individual who:

  • Loves helping people
  • Is committed to excellence
  • Is forward thinking
Job Overview

Under the direction of the Director of Services, the Cybersecurity Engineer is experienced in managing cloud infrastructure, deploying/maintaining security monitoring solutions, automation, vulnerability management and other Sec Ops skills in compliance driven environments. In this role, the Cybersecurity Engineer is responsible for protecting our internal and external clients as a member of our high touch, customer centric team. The Cybersecurity Engineer will be exposed to many different technologies, compliance frameworks, and cybersecurity methodologies.

As such, they will not be expected to know everything, but expected to be resourceful in finding solutions.

Essential Functions
  • Perform security reviews, identify gaps in security architecture.
  • Verify that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations.
  • Support Security Analysts by performing incident response activities (containment and eradication) when escalation is needed.
  • Verify and update security documentation reflecting the application/system security design features.
  • Deploy, support, and manage Network Security Monitoring (NSM), Endpoint Detection and Response (EDR), and Vulnerability Management solutions.
  • Deploy, Manage, support, and secure compliance driven on‑premises environments and cloud environments in Microsoft GCC High.
  • Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
  • Perform remediation and remediation management on identified vulnerabilities in cloud and on‑premises environments.
  • Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.
  • Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).
  • Assess the effectiveness of security controls, implement security controls, and manage security controls.
  • Assess all the configuration management (change configuration/release management) processes and support their management.
  • Employ secure configuration management processes.
  • Deploy, manage, and support Network Access Control (NAC), Application Control, and Data Loss prevention solutions.
  • Provide advice on project costs, design concepts, or design changes.
  • Provide input on security requirements to be included in statements of work and other appropriate procurement documents.
  • Translate proposed capabilities into technical requirements.
  • Configure and optimize network hubs, routers, and switches for security monitoring.
  • Design and implement group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs.
  • Maintain baseline system security according to organizational policies.
  • Manage cybersecurity system/server resources including performance, capacity, availability, serviceability, and recoverability.
  • Apply security policies to meet security objectives of the system.
  • Ensure that cybersecurity‑enabled products or other compensating security control technologies reduce identified…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary