Genesis10 is currently seeking a Sr. Security Engineer with our client in the transportation industry in their Atlanta, GA location. This is a 12 month + contract position.
Description:
Seeking a Sr. Security Engineer
Our client is on a journey to becoming the best IT organization in the airline industry, a journey of transformation. They are changing the way we do business from top to bottom as we strive to create meaningful and innovative solutions and are looking for team members to help us realize our vision
Responsibilities:
Lead the implementation and migration to Microsoft Intune at an enterprise scale
Design and implement security policies and configurations for device management with Microsoft Intune
Recommend best practices and test new features of the product
Provide training and support to partner teams and end users on new security features
Collaborate with business partners who could benefit from the new tools, assisting with implementing new use cases
Continuously monitor and optimize the performance and security of the solution
Administer data protection tools including patching, upgrading, troubleshooting, testing and report generation
Develop new policies using regex, machine learning, fingerprinting, and/or dictionaries to monitor unique data types
Review existing deployment architecture, engineering, and policies and assess overall deployment against best practices
Evaluate and build new data protection solutions in alignment with cloud requirements
Operationalize solutions to deliver value to the business
Implement protective controls in the cloud to ensure the confidentiality, integrity, and availability of data
Responsible for the design, testing, evaluation, implementation, support, management, and deployment of security systems/devices used to safeguard the organization's information assets
Responsible for analyzing the information security environment and assisting with the development of security measures to safeguard information against accidental or unauthorized modification, destruction, or disclosure
Works with the technical team to recover data after a security breach
Configures and installs firewalls and intrusion detection systems
Develops automation scripts to handle and track incidents
Investigates intrusion incidents, conducts forensic investigations and mounts incident responses
Delivers technical reports and formal papers on test findings
Installs firewalls, data encryption, and other security measures
Maintains access by providing information, resources, and technical support
Ensures authorized access by investigating improper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements
Updates job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations
Accomplishes information systems and organization mission by completing related results as needed
Builds, deploys, and tracks security measurements for computer systems and networks
Mitigates security vulnerabilities by implementing applicable solutions and tools
Performs vulnerability testing, risk analyses, and security assessments
Collaborates with colleagues on authentication, authorization, and encryption solutions
Tests security solutions using industry standard analysis criteria
Responds to information security issues during each stage of a project's lifecycle
Performs risk assessments and testing of data processing systems
Establishes system controls by developing framework for controls and levels of access; recommending improvements
Establishes computer and terminal physical security by developing standards, policies, and procedures; coordinates with facilities security; recommends improvements
Safeguards computer files by performing regular backups; developing procedures for source code management and disaster preparedness; recommends improvements
Determines the sensitivity of the data in order to recommend the appropriate security needs
Develops proposals for, and consider cost effective equipment options to satisfy security needs
Communicates with the technical team, management team and users companywide if data security is breached
Designs infrastructure to alert the technical team of detected vulnerabilities
Evaluates new technologies and processes that enhance security capabilities
Supervises changes in software, hardware, facilities, telecommunications and user needs
Defines, implements, and maintains corporate security policies
Analyzes and advises on new security technologies and program conformance
Creates, tests, and implements network disaster recovery plans
Recommends security enhancements and purchases
Trains staff on network and information security procedures
Develops security awareness by providing orientation, educational programs, and on-going communication
Recommends modifications in legal, technical, and regulatory areas that affect IT security
Requirements:
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field
At least 3 years of experience working with Microsoft 365 technologies including Microsoft Intune and Microsoft Purview
Experience administering Microsoft BitLocker Administration and Monitoring (MBAM) solution
Strong technical knowledge of secure architectures, system policies, rules, etc.
Experience with designing and automating data protection strategies for cloud environments
Familiar with securing structured and unstructured data
Experience working with Data Loss Prevention (DLP) solutions
Experience with deploying and managing data classification solutions
Experience with managing devices using policies in Microsoft Intune
Understanding of regulatory structures such as PCI and GDPR
Creative and adaptive work ethic, with a strong customer-oriented attitude
Microsoft Intune
Microsoft BitLocker Administrator
Microsoft Purview
Microsoft 365
Microsoft Azure
Desired Skills:
Professional certifications such as CISSP, CISM, CEH, Security+, or SANS GIAC
Cloud certifications such as Microsoft Certified Security, Compliance, and Identity Fundamentals
If you have the described qualifications and are interested in this exciting opportunity, please apply!
About Genesis10:
Ranked a Top Staffing Firm in the U.S. by Staffing Industry Analysts for six consecutive years, Genesis10 puts thousands of consultants and employees to work across the United States every year in contract, contract-for-hire, and permanent placement roles. With more than 300 active clients, Genesis10 provides access to many of the Fortune 100 firms and a variety of mid-market organizations across the full spectrum of industry verticals.
For contract roles, Genesis10 offers the benefits listed below. If this is a perm-placement opportunity, our recruiter can talk you through the unique benefits offered for that particular client. Benefits of Working with Genesis10:
Access to hundreds of clients, most who have been working with Genesis10 for 5-20+ years.
The opportunity to have a career-home in Genesis10; many of our consultants have been working exclusively with Genesis10 for years.
Access to an experienced, caring recruiting team (more than 7 years of experience, on average.)
For multiple years running, Genesis10 has been recognized as a Top Staffing Firm in the U.S., as a Best Company for Work-Life Balance, as a Best Company for Career Growth, for Diversity, and for Leadership, amongst others. To learn more and to view all our available career opportunities, please visit us at our website.
Genesis10 is an Equal Opportunity Employer. Candidates will receive consideration without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Genesis10 is an Equal Opportunity Employer/Minorities/Female/Disabled/Veteran