Configure and manage firewalls (e.g., Palo Alto) to protect network infrastructure and prevent unauthorized access
Manage encryption protocols (e.g., AES) to ensure data confidentiality and integrity across the organization
Deploy and maintain Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) to detect and mitigate threats in real-time
Utilize penetration testing tools (e.g., Metasploit) to identify vulnerabilities and assess the security posture of systems and applications
Analyze logs using the ELK Stack (Elasticsearch, Logstash, Kibana) to detect anomalies, investigate incidents, and enhance security monitoring
Develop and implement risk assessment models to evaluate potential security risks and prioritize mitigation efforts
Collaborate with cross-functional teams to align cybersecurity strategies with business objectives and IT strategies
Develop and maintain comprehensive documentation for cybersecurity processes, configurations, and procedures
Stay current with emerging cybersecurity technologies, trends, and best practices
Participate in the procurement and evaluation of cybersecurity tools and software
Ensure compliance with industry regulations and internal policies in all cybersecurity efforts
Conduct regular reviews and audits of cybersecurity processes to identify areas for improvement
Contribute to the continuous improvement of cybersecurity strategies and methodologies
Engage in knowledge-sharing activities and training sessions to enhance team skills and capabilities
Requirements
Active DoD Public Trust clearance or US citizen with ability to obtain Public Trust upon hire
Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field (additional years of experience may be considered in lieu of degree)
8+ years of experience as a Cybersecurity Engineer
Proficiency in configuring and managing firewalls (e.g., Palo Alto)
Strong skills in managing encryption protocols (e.g., AES)
Experience in deploying and maintaining IDS/IPS solutions
Proficiency in using penetration testing tools (e.g., Metasploit)
Expertise in log analysis using the ELK Stack (Elasticsearch, Logstash, Kibana)
Knowledge of risk assessment modeling and techniques
Excellent problem-solving and analytical skills
Strong communication and interpersonal skills
Tech Stack
Cyber Security
ElasticSearch
Firewalls
Logstash
Benefits
healthcare
wellness
financial
retirement
family support
continuing education
time off benefits
Cybersecurity Engineer – Intermediate at CACI International Inc | JobVerse