Defensive Security Engineer
Location
United States + 144 moreAll locations: United States, Canada, Brazil, Colombia, Argentina, Chile, Venezuela, Bolivarian Republic Of, Bolivia, Plurinational State Of, Ecuador, French Guiana, Guyana, Paraguay, Peru, Suriname, Uruguay, Mexico, Costa Rica, El Salvador, Guatemala, Honduras, Nicaragua, Panama, Dominican Republic, Puerto Rico, Bahamas, Guadeloupe, Haiti, Jamaica, Martinique, Montserrat, United Kingdom, Germany, France, Estonia, Portugal, Hungary, Poland, Ukraine, Romania, Bulgaria, Czech Republic, Slovakia, Belarus, Moldova, Republic Of, Sweden, Greece, Belgium, Italy, Ireland, Switzerland, Netherlands, Finland, Malta, Denmark, Lithuania, Croatia, Spain, Austria, Bosnia And Herzegovina, Iceland, Luxembourg, Macedonia, The Former Yugoslav Republic Of, Montenegro, Norway, Serbia, Slovenia, Albania, Cyprus, Latvia, Monaco, South Africa, Egypt, Algeria, Angola, Benin, Botswana, Burkina Faso, Burundi, Cameroon, Cape Verde, Central African Republic, Chad, Congo, Côte D'ivoire, Congo, The Democratic Republic Of The, Equatorial Guinea, Eritrea, Ethiopia, Gabon, Gambia, Ghana, Guinea, Guinea-bissau, Kenya, Lesotho, Liberia, Libyan Arab Jamahiriya, Madagascar, Malawi, Mali, Mauritania, Mauritius, Mayotte, Morocco, Mozambique, Namibia, Niger, Nigeria, Réunion, Rwanda, Senegal, Seychelles, Sierra Leone, Somalia, Sudan, Swaziland, Tanzania, United Republic Of, Togo, Tunisia, Uganda, Zambia, Zimbabwe, Georgia, Turkey, Israel, United Arab Emirates, Armenia, Azerbaijan, Bahrain, Iraq, Jordan, Kuwait, Lebanon, Oman, Qatar, Saudi Arabia, Palestinian Territory, Occupied, Yemen
Posted
6 days ago
Salary
Not specified
Job Description
Role Description
- Identify vulnerabilities and potential exposure across enterprise networks, systems, and applications through continuous security assessments.
- Conduct technical and non-technical risk assessments of technology environments, including local systems, network infrastructure, application environments, and supporting services.
- Evaluate the effectiveness of existing security controls and recommend improvements to strengthen the organization’s security posture.
- Provide actionable recommendations on cost-effective security controls to mitigate risks and protect information, systems, and business processes.
- Produce technical documentation, incident reports, investigation summaries, and security findings to support situational awareness and informed decision-making.
- Perform authorized security testing and vulnerability assessments on enterprise network assets and applications.
- Conduct security reviews for new or updated applications to ensure compliance with secure development and deployment standards.
- Continuously monitor and review system security status to ensure risks remain within acceptable thresholds.
- Develop recommendations for strengthening defensive controls based on assessment and testing results.
- Design and facilitate cybersecurity tabletop exercises to test incident response preparedness and improve team coordination.
- Collaborate with security operations teams to develop and improve security alerts and detection capabilities.
- Analyze threat trends to identify Indicators of Compromise (IOCs) and emerging threat patterns.
- Conduct proactive threat hunting to detect suspicious activity and uncover hidden threats within the environment.
- Identify control gaps that could allow threats to enter or move within the network.
- Support the design and development of security tools, technologies, and automation to enhance defensive capabilities.
- Develop and implement cybersecurity countermeasures and risk mitigation strategies for systems and applications.
- Evaluate internally developed security tools to ensure effectiveness and operational readiness.
- Assess system features and configurations to identify opportunities for strengthening security controls and improving resilience.
- Perform security analysis of infrastructure components to identify weaknesses and areas for improvement.
- Review wireless and network security configurations to ensure they meet security best practices.
- Analyze security incidents and malicious activity to understand attack methods, exploited weaknesses, and potential impacts on systems and information.
Qualifications
- Bachelor's Degree in Computer Science, Information Technology, Electrical & Electronic Engineering, or a related discipline from a reputable university.
- 3 years experience in a similar role, preferably in a Fin-tech.
- Planning, organization, & problem-solving skills.
Benefits
- Very Competitive & Rewarding Pay.
- Flexible work option (Remote).
- Paid Lunch for onsite work.
- Lifelong Learnings.
Job Requirements
- Bachelor's Degree in Computer Science, Information Technology, Electrical & Electronic Engineering, or a related discipline from a reputable university.
- 3 years experience in a similar role, preferably in a Fin-tech.
- Planning, organization, & problem-solving skills.
Benefits
- Very Competitive & Rewarding Pay.
- Flexible work option (Remote).
- Paid Lunch for onsite work.
- Lifelong Learnings.
Related Guides
Related Categories
Related Job Pages
More Security Engineer Jobs
Information Assurance Engineer implementing security controls in DoD environments
Content Marketing Writer – Cybersecurity, Developer
DXC TechnologyDelivering excellence for our customers and colleagues
Content Marketing Writer focusing on developer-centric security content
Senior Technical Consultant
JobgetherWe use an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements. Our system identifies the top-fitting candidates, and this shortlist is then shared directly with the hiring company. The final decision and next steps (interviews, assessments) are managed by their internal team. We appreciate your interest and wish you the best! Data Privacy Notice: By submitting your application, you acknowledge that Jobgether will process your personal data to evaluate your candidacy and share relevant information with the hiring employer. This processing is based on legitimate interest and pre-contractual measures under applicable data protection laws (including GDPR). You may exercise your rights (access, rectification, erasure, objection) at any time. #LI-CL1 We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
This role offers the opportunity to be a key contributor in deploying, optimizing, and enhancing advanced cybersecurity platforms for a diverse client base. The Senior Technical Consultant will work hands-on with Palo Alto XSIAM, Cortex XDR, and XSOAR, implementing complex config...
Chief Product Security Officer
JobgetherWe use an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements. Our system identifies the top-fitting candidates, and this shortlist is then shared directly with the hiring company. The final decision and next steps (interviews, assessments) are managed by their internal team. We appreciate your interest and wish you the best! Data Privacy Notice: By submitting your application, you acknowledge that Jobgether will process your personal data to evaluate your candidacy and share relevant information with the hiring employer. This processing is based on legitimate interest and pre-contractual measures under applicable data protection laws (including GDPR). You may exercise your rights (access, rectification, erasure, objection) at any time. #LI-CL1 We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
This position is posted by Jobgether on behalf of a partner company. We are currently looking for a Chief Product Security Officer - REMOTE. In this pivotal role, you will drive the global product security strategy to protect the digital framework of the power industry, including...