Western States Machine Company
Cybersecurity Engineer
Western States Machine Company, Meridian, Idaho, us, 83680
SUCCESS AT WESTERN STATES:Western State's culture is based on passion for our Vision, Mission, and VALUES. We are fiercely committed to SAFETY and sending every employee, safely home, every day. We strive for EXCELLENCE in all we do and are proud to be a "play to win" organization. We act with INTEGRITY in each and every decision we make. Our People and TEAMWORK drive a fun and engaging culture. We are ACCOUNTABLE as individuals and as an organization.
JOB SUMMARY: The Cybersecurity Engineer is responsible for designing, implementing, and maintaining security measures to protect company networks, data, and systems from cyber threats. Key responsibilities include performing system evaluations, vulnerability testing, network hardening, and monitoring network traffic for threats. The role involves creating security reports and dashboards for senior leadership, coordinating with business units to balance security practices with operational workflows, managing incident responses, and active and proactive threat hunting. This position collaborates with IT teams and business units on new deployments, in policy management, and in end-user education on cybersecurity principles. Further, the role requires proficiency with the Microsoft E5 security stack, Microsoft Azure, and NIST and CISA frameworks implementations. Perhaps most importantly, the Cybersecurity Engineer aims to foster a cyber-safe culture across the organization.
ESSENTIAL FUNCTIONS:
Safety
Actively cares, promotes, manages, and advocates safety at Western States.As a team member in the organization, it is critical to ensure all employees, vendors, and clients have a safe work environment while adhering to all applicable safety policies, procedures and standards.Maintains clean/clutter free personal work areas to ensure a safe environment for all WSECO employees.Adhering to required personal protective equipment (PPE) as identified in safety policy.Cybersecurity
Design, implement, and maintain security solutions to protect company networks, data, and systems from cyber threats.Perform system evaluations including security baselines, vulnerability testing and resolution, and system hardening.Maintain network security in cloud-based and on-premises systems including edge firewall, switch, and network security groups.Build security reporting and dashboards; prepare presentations on security posture and metrics for senior and executive leadership.Coordinate security efforts with business units to balance workflow and security best practices.Contribute to and maintain cybersecurity policy including Incident Response, Data Management, Vulnerability Management, and others.Work with infrastructure teams to manage installation of latest security patches, firmware, and other attack surface reduction efforts.Monitor network traffic and perform threat hunting to ensure overall security and appropriate incident response activity; Monitor logging, alerts, behavioral analysis, and other data incorporated into company SIEM to defend against threats.Recommend cybersecurity improvements and spearhead projects for implementation of solutions.Provide support in incident response investigations and work with other IT and business units to contain and resolve security incidents.Monitor new developments in the cybersecurity landscape, including zero day, CVE, and emerging threat intelligence.Participate in software implementation and software development meetings to provide security insights and recommendations to ensure up-front protection in new deployments.Remediate issues occurring with any IT security systems including but not limited to unexplained system outages, cyber security incidents, issues with data collection feeds or interfaces with external MSSP providers.Collaborate with IT teams and senior staff in planning, designing, developing, deploying, integrating and maintaining cyber security tools.Author and maintain documentation of processes and procedures in the central knowledge base.Participates in after-incident lessons learned meetings to give input on recommendations for additional tools or other mitigations for future incidents.Perform other duties as assigned.SKILLS, KNOWLEDGE, AND ABILITIES:
Knowledge of SASE, SWG, RBI, and CASB.Experience in DLP, ZTNA, RBAC, and similar security principle implementation.Demonstrated knowledge of the Microsoft E5 security stack including Defender XDR, Sentinel, Azure EASM, Defender for 365 (Exchange Tools), etc.Extensive use of SIEM and SOAR tools to monitor, alert, and respond to cybersecurity threats as they occur.Experience with NIST and CISA frameworks and demonstrable implementations within business environments.End-user education of security principles and the building of a "cyber-safe" culture.Knowledge of third-party management and the potential cybersecurity risks involved in third-party relationships.Experience with MSSP's and/or MCRR providers.Demonstrated ability to prioritize, execute tasks and meet deadlines.Ability to interact with colleagues from all levels of the organization, both technical and non-technical, and communicate technical ideas effectively.Requires self-motivated approach to work with keen attention to detail and accuracy.Ability to work in a team-oriented, collaborative environment with minimal oversight.Computer proficiency in Microsoft Office, Internet and other security-oriented software.Proven ability to work effectively in a team environment as well as independently, with minimal direction.EDUCATION AND EXPERIENCE:
Bachelors' degree in Systems Engineering, Computer Engineering, Computer Science, or other closely related discipline. Equivalent experience may be considered in lieu of formal degree.Minimum of 5 years of experience in security operations, administration, or engineering.Must be able to communicate (speak, read, comprehend, write in English).PHYSICAL CHARACTERISTICS:
Must be able to sit for long periods along with walking, standing, climbing stairs, reaching, pushing, pulling, leaning and twisting.Able to lift up to 30 lbs in accordance with Western States' Lifting Safe Work Practice to include amount and approach.Must be able to meet all safety requirements for applicable safety policies.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
JOB SUMMARY: The Cybersecurity Engineer is responsible for designing, implementing, and maintaining security measures to protect company networks, data, and systems from cyber threats. Key responsibilities include performing system evaluations, vulnerability testing, network hardening, and monitoring network traffic for threats. The role involves creating security reports and dashboards for senior leadership, coordinating with business units to balance security practices with operational workflows, managing incident responses, and active and proactive threat hunting. This position collaborates with IT teams and business units on new deployments, in policy management, and in end-user education on cybersecurity principles. Further, the role requires proficiency with the Microsoft E5 security stack, Microsoft Azure, and NIST and CISA frameworks implementations. Perhaps most importantly, the Cybersecurity Engineer aims to foster a cyber-safe culture across the organization.
ESSENTIAL FUNCTIONS:
Safety
Actively cares, promotes, manages, and advocates safety at Western States.As a team member in the organization, it is critical to ensure all employees, vendors, and clients have a safe work environment while adhering to all applicable safety policies, procedures and standards.Maintains clean/clutter free personal work areas to ensure a safe environment for all WSECO employees.Adhering to required personal protective equipment (PPE) as identified in safety policy.Cybersecurity
Design, implement, and maintain security solutions to protect company networks, data, and systems from cyber threats.Perform system evaluations including security baselines, vulnerability testing and resolution, and system hardening.Maintain network security in cloud-based and on-premises systems including edge firewall, switch, and network security groups.Build security reporting and dashboards; prepare presentations on security posture and metrics for senior and executive leadership.Coordinate security efforts with business units to balance workflow and security best practices.Contribute to and maintain cybersecurity policy including Incident Response, Data Management, Vulnerability Management, and others.Work with infrastructure teams to manage installation of latest security patches, firmware, and other attack surface reduction efforts.Monitor network traffic and perform threat hunting to ensure overall security and appropriate incident response activity; Monitor logging, alerts, behavioral analysis, and other data incorporated into company SIEM to defend against threats.Recommend cybersecurity improvements and spearhead projects for implementation of solutions.Provide support in incident response investigations and work with other IT and business units to contain and resolve security incidents.Monitor new developments in the cybersecurity landscape, including zero day, CVE, and emerging threat intelligence.Participate in software implementation and software development meetings to provide security insights and recommendations to ensure up-front protection in new deployments.Remediate issues occurring with any IT security systems including but not limited to unexplained system outages, cyber security incidents, issues with data collection feeds or interfaces with external MSSP providers.Collaborate with IT teams and senior staff in planning, designing, developing, deploying, integrating and maintaining cyber security tools.Author and maintain documentation of processes and procedures in the central knowledge base.Participates in after-incident lessons learned meetings to give input on recommendations for additional tools or other mitigations for future incidents.Perform other duties as assigned.SKILLS, KNOWLEDGE, AND ABILITIES:
Knowledge of SASE, SWG, RBI, and CASB.Experience in DLP, ZTNA, RBAC, and similar security principle implementation.Demonstrated knowledge of the Microsoft E5 security stack including Defender XDR, Sentinel, Azure EASM, Defender for 365 (Exchange Tools), etc.Extensive use of SIEM and SOAR tools to monitor, alert, and respond to cybersecurity threats as they occur.Experience with NIST and CISA frameworks and demonstrable implementations within business environments.End-user education of security principles and the building of a "cyber-safe" culture.Knowledge of third-party management and the potential cybersecurity risks involved in third-party relationships.Experience with MSSP's and/or MCRR providers.Demonstrated ability to prioritize, execute tasks and meet deadlines.Ability to interact with colleagues from all levels of the organization, both technical and non-technical, and communicate technical ideas effectively.Requires self-motivated approach to work with keen attention to detail and accuracy.Ability to work in a team-oriented, collaborative environment with minimal oversight.Computer proficiency in Microsoft Office, Internet and other security-oriented software.Proven ability to work effectively in a team environment as well as independently, with minimal direction.EDUCATION AND EXPERIENCE:
Bachelors' degree in Systems Engineering, Computer Engineering, Computer Science, or other closely related discipline. Equivalent experience may be considered in lieu of formal degree.Minimum of 5 years of experience in security operations, administration, or engineering.Must be able to communicate (speak, read, comprehend, write in English).PHYSICAL CHARACTERISTICS:
Must be able to sit for long periods along with walking, standing, climbing stairs, reaching, pushing, pulling, leaning and twisting.Able to lift up to 30 lbs in accordance with Western States' Lifting Safe Work Practice to include amount and approach.Must be able to meet all safety requirements for applicable safety policies.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)