Bull Integrations Group Inc.
Cybersecurity Engineer 3 - Fully Remote - Contract
Bull Integrations Group Inc., , , United States,
Cybersecurity Engineer 3 - Fully Remote Must be in EST) - Contract
Job Description: Cybersecurity Engineer 3Job Code: 4515tEmployment Type: Remote, TemporaryDepartment: ITLevel: Mid-Level
Our client is seeking a skilled Cybersecurity Engineer 3 to lead penetration testing efforts and manage Splunk data collection infrastructure. This fully remote position requires candidates based in Eastern Standard Time (EST) areas and offers an excellent opportunity to strengthen organizational cybersecurity practices.
Key Responsibilities
Penetration Testing (Pentest):
Must-Haves:
This position provides a compelling opportunity for experienced cybersecurity professionals to contribute to critical IT security initiatives. Apply now to join a forward-thinking team committed to enhancing digital safety and resilience!
Job Description: Cybersecurity Engineer 3Job Code: 4515tEmployment Type: Remote, TemporaryDepartment: ITLevel: Mid-Level
Our client is seeking a skilled Cybersecurity Engineer 3 to lead penetration testing efforts and manage Splunk data collection infrastructure. This fully remote position requires candidates based in Eastern Standard Time (EST) areas and offers an excellent opportunity to strengthen organizational cybersecurity practices.
Key Responsibilities
Penetration Testing (Pentest):
- Conduct penetration tests on VDH applications and systems within designated timelines.
- Perform remote or onsite assessments of systems, networks, and applications to identify vulnerabilities.
- Analyze vulnerabilities, propose mitigation strategies, and recommend security enhancements.
- Deliver comprehensive reports detailing findings, risks, and actionable recommendations.
- Collaborate with VDH IT teams to define testing requirements and objectives.
- Design and implement new penetration testing methodologies, tools, and scripts.
- Oversee Splunk data collection infrastructure, including deployment server management for Splunk Universal Forwarder (UF) instances.
- Maintain syslog servers to collect data from firewalls, IDS, UPS, and other syslog-generating systems.
- Manage Splunk heavy forwarders to retrieve data from databases or third-party systems.
- Leverage Splunk HTTP event collectors for custom application data ingestion.
- Utilize Splunk Stream for wire data capture and statistical analysis when required.
- Re-architect syslog aggregation to improve availability and storage, as needed.
- Expand log source collection for existing data types.
- Develop custom scripts to integrate data from non-standard products or applications.
Must-Haves:
- Splunk Administration: Minimum of 3 years managing Splunk infrastructure.
- Penetration Testing: At least 4 years conducting pentests on applications and systems.
- Risk Assessment: Minimum of 3 years of experience in risk analysis and mitigation.
- NIST 800-53 Framework: 3+ years of working knowledge and application.
- Security Awareness: At least 2 years of experience in fostering security-conscious practices.
- Vulnerability Management: 2+ years managing and addressing vulnerabilities.
- Collaboration: Proven team player with 4+ years of experience in collaborative environments.
- Strong analytical and problem-solving abilities.
- Familiarity with advanced cybersecurity tools and methodologies.
- Excellent communication and detailed reporting skills.
- Location: Fully remote; applicants must reside in EST time zones.
- Compensation:
- Hourly: $59-$63/hr
- Annualized Equivalent: $122,720-$131,040
This position provides a compelling opportunity for experienced cybersecurity professionals to contribute to critical IT security initiatives. Apply now to join a forward-thinking team committed to enhancing digital safety and resilience!