Senior Cybersecurity Engineer Position Available In Chester, Pennsylvania
Tallo's Job Summary: This job listing in Chester - PA has been recently added. Tallo will add a summary here for this job shortly.
Job Description
Job Description:
When visionary companies need to know how their world-changingideas will perform, they close the gap between design and realitywith Ansys simulation. For more than 50 years, Ansys software hasenabled innovators across industries to push boundaries by usingthe predictive power of simulation. From sustainable transportationto advanced semiconductors, from satellite systems to life-savingmedical devices, the next great leaps in human advancement will bepowered by Ansys.
Summary / Role
Purpose The Ansys GovernmentInitiatives (AGI) Senior Cybersecurity Engineer is a direct reportto the AGI Director of Cybersecurity and will perform cybersecurityanalysis, triage functions and countermeasure develop required tosafeguard the network and hosts. The AGI Senior CybersecurityEngineer will administrator company security software and managesecurity infrastructure where applicable. They will act as aSubject Matter Expert (SME) to other functional units within thecompany as it pertains to security configurations, vulnerabilitiesand security best practices. The AGI Cybersecurity Engineer willalso work with penetration tools at the AGI Directory ofCybersecurity’s discretion to perform internal assessments. Theywill also provide support as needed during surge operations forpatching and remediation to ensure the company’s network and datais protected. This position does not qualify for immigrationsponsorship. Key Duties and Responsibilities
- Oversee and ensuresuccessful execution of all configuration, implementation andmaintenance of host-based firewalls, intrusion prevention system(IPS), anti-virus (AV) software, SELinux, network firewalls, IPS,SIEMs and proxies
- Develop Standard Operating Procedures (SOPs)for various security tools utilized within the environment
- Oversee and ensure the successful development and deployment ofcountermeasures for network and hosts systems based on open sourceintelligence (OSINT) or behavioral analysis
- Monitor, tune andimplement countermeasures in various security tools such as TrellixePO, Palo Alto and QRadar
- Perform incident response and followchain of custody processes during investigations
- Characterize andanalyze network/host traffic to identify anomalous activity andpotential threats to company resources
- Lead and perform malwareanalysis and reverse engineering of suspicious files
- Configuration, implementation and maintenance of data lossprevention (DLP) solutions to include implementation,administration and maintenance
- Lead and perform basicvulnerability/penetration testing upon request from the Directoryof Cybersecurity
- Document cyber response finding and present themto leadership in a clear, concise manner MinimumEducation/Certification Requirements and Experience
- Bachelor’sdegree in Computer Science/Bachelor’s Degree in InformationTechnology from an accredited college/university or related workexperience
- Minimum of five (5) years of actively supporting IT orCybersecurity Operations
- Minimum two (2) years performingSecurity Operations Center (SOC) functions such as incidentresponder, security investigator, advanced security analyst orsecurity engineer/architect
- Proficiency in at least two (2)scripting languages
- Operational familiarity with Kali Linux
- Compliant with DoD IAT Level II
- Must be able to obtain orcurrently have a DoD or DHS Top Secret with SCI Eligibility
- Excellent communication and teamwork skills
- Detail oriented witha strong written communication skill Preferred Qualifications andSkills
- Current technical understanding of hardware and softwaretechnology
- Organizational, communication, prioritization, andtime management skills.
- Analytical, problem solving, anddecision-making skills.
- Strong customer relationship managementskills to include training for the user base.
- Can presentinformation to groups
- Competent with a proven work history ofworking with Threat Intelligence.
- Competent with a proven workhistory of working with and selecting/building security tools(SIEM, vulnerability scanning, firewalls, etc.
)