Consultant - Cyber Engineering and Tech Ops (Endpoint Security)

Cargill
2 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Intermediate

Job location

Tech stack

Proxy Servers
Cloud Computing
Collaborative Software
Computer Security
Databases
Disaster Recovery
Web Servers
Systems Analysis
Information Technology Operations
Virtual Private Networks (VPN)
Local Area Networks
Network Segmentation
Mobile Security
Wide Area Networks
Malware
Information Technology

Job description

  • CYBERSECURITY TECHNOLOGIES: Implements, operates, and participates in designing cybersecurity protective technologies, including endpoint detection and response, cloud infrastructure controls and network protections.
  • TECHNOLOGY MANAGEMENT: Operates technologies such as wide area network, partner gateways, internet of things security, email, collaboration tools, local area network, wireless and network segmentation, virtual private networks, proxies, demilitarized zones, middle tier systems, databases and web servers.
  • CO-CREATION WITH IT OPERATIONS: Participates as a co-creator and operating partner with internal cross functional teams on shared infrastructure initiatives.
  • IT SERVICE MANAGEMENT INTERFACES: Operates all information technology service management interfaces, including asset, change, configuration, problem, and request management.
  • RESEARCHES SECURITY NEEDS: Researches moderately complex system security needs for operations development, including security requirements definition, risk assessment and systems analysis.
  • SECURITY POLICIES: Drafts and provides analytical support for security policy development and analysis in compliance with industry standards.
  • INCIDENT RESPONSE: Prepares and performs moderately complex incident response, disaster recovery, and business continuity planning, ensuring readiness for potential security breaches.

Requirements

  • Minimum requirement of 2 years of relevant work experience. Typically reflects 3 years or more of relevant experience.
  • Hands on experience with Microsoft Defender and or Tanium is preferred.
  • Hands on experience with Malware protection, Malware analysis and Endpoint protection
  • Hands on experience with Mobile Security and JAMF.

Apply for this position