{"id":731,"date":"2025-12-04T10:57:00","date_gmt":"2025-12-04T10:57:00","guid":{"rendered":"https:\/\/skillbasedmatching.com\/jobs\/?post_type=jobpost&#038;p=731"},"modified":"2025-12-04T10:57:04","modified_gmt":"2025-12-04T10:57:04","slug":"cybersecurity-engineer-advanced-focus","status":"publish","type":"jobpost","link":"https:\/\/skillbasedmatching.com\/jobs\/current-jobs\/cybersecurity-engineer-advanced-focus\/","title":{"rendered":"Cybersecurity Engineer (Advanced Focus)"},"content":{"rendered":"\n<p>\u200bThis is an <strong>advanced level, remote, contract-to-hire<\/strong> <strong>Cybersecurity Engineer<\/strong> role focused on system and network security. The engineer will be a top-level contributor and expert in security operations, incident response, and forensic analysis. This position requires deep technical knowledge in networking, Linux\/Windows administration, advanced scripting, and malware analysis, preferably within banking, government, or healthcare sectors.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u200b<strong>Location:<\/strong> York, Pennsylvania (Remote Friendly).<\/li>\n\n\n\n<li>\u200b<strong>Work Type:<\/strong> Contract To Hire (3 months duration to start).<\/li>\n\n\n\n<li>\u200b<strong>Experience:<\/strong> 5+ years of IT experience with <strong>3+ years of enterprise information system security experience<\/strong> is required.<\/li>\n\n\n\n<li>\u200b<strong>Education:<\/strong> Associate&#8217;s Degree Required; Bachelor&#8217;s Degree preferred.<\/li>\n\n\n\n<li>\u200b<strong>Certification:<\/strong> <strong>CISSP, ISSA, CCSP or related security certification(s) Upon Hire Required<\/strong>.<\/li>\n\n\n\n<li>\u200b<strong>Focus:<\/strong> Continuous monitoring program, incident response management (forensics, containment), security system deployment (Check Point, Anti-virus, DLP, etc.), and developing architectural\/functional specifications.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u200bDuties &amp; Responsibilities: Incident, Monitoring, and Design<\/h3>\n\n\n\n<p>\u200bThe engineer is responsible for high-level operations, security architecture, and complex threat analysis.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u200b<strong>Security Operations &amp; Monitoring:<\/strong> Make enhancements to existing monitoring and security operations, and contribute to a <strong>continuous monitoring program framework<\/strong>. Monitor information systems and maintain security controls to ensure regulatory compliance.<\/li>\n\n\n\n<li>\u200b<strong>Deployment &amp; Integration:<\/strong> Participate in the deployment and operation of information security systems, including integration, testing, troubleshooting, and updating\/upgrading of various security tools (Anti-virus, IPS, malware detection, DLP, Identity and access management, encryption tools).<\/li>\n\n\n\n<li>\u200b<strong>Incident Response:<\/strong> Key participant\/operator in incident response activities, including reporting, enterprise coordination, isolation, containment, eradication, and recovery. Provides <strong>forensic analysis<\/strong> for incidents. Participates in tactical efforts to stem attacks.<\/li>\n\n\n\n<li>\u200b<strong>Threat Analysis:<\/strong> Provides advanced expertise around the <strong>analysis of malware, suspicious emails<\/strong>, and writes protection signatures.<\/li>\n\n\n\n<li>\u200b<strong>Documentation &amp; Reporting:<\/strong> Develops and maintains various daily reports for audit review (security and change management). Responsible for writing the <strong>architectural and functional specifications<\/strong> related to security and data flows.<\/li>\n\n\n\n<li>\u200b<strong>Support:<\/strong> Provides advanced technical support and consultation on complex projects. Provides <strong>after hours, on-call support<\/strong> as needed.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">\u200bRequired Knowledge and Skills<\/h3>\n\n\n\n<p>\u200bThe role mandates advanced knowledge in core infrastructure and offensive\/defensive security.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u200b<strong>Core Security Expertise:<\/strong>\n<ul class=\"wp-block-list\">\n<li>\u200bAdvanced <strong>awareness and understanding of cybersecurity trends and hacking techniques<\/strong>.<\/li>\n\n\n\n<li>\u200bAdvanced knowledge of <strong>malware analysis<\/strong> and writing protection signatures.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>\u200b<strong>Networking &amp; OS:<\/strong>\n<ul class=\"wp-block-list\">\n<li>\u200bAdvanced knowledge of <strong>common application-level protocols<\/strong> (SMTP, SSH, HTTPS, FTP) and <strong>network fundamentals<\/strong> (routing, switching).<\/li>\n\n\n\n<li>\u200bAdvanced understanding of <strong>Linux and\/or Windows administration<\/strong>.<\/li>\n\n\n\n<li>\u200bAdvanced <strong>scripting knowledge<\/strong> (Bash, VBScript, Perl, PHP, etc.).<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>\u200b<strong>Domain (Preferred):<\/strong> Prior experience in banking, government, or healthcare security procedures, specifically with a network and\/or security engineering focus.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u200bThis is an advanced level, remote, contract-to-hire Cybersecurity Engineer role focused on system and network security. The engineer will be a top-level contributor and expert in security operations, incident response, and forensic analysis. This position requires deep technical knowledge in networking, Linux\/Windows administration, advanced scripting, and malware analysis, preferably within banking, government, or healthcare sectors. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"menu_order":0,"template":"","jobpost_category":[43],"jobpost_job_type":[39],"jobpost_location":[],"jobpost_tag":[3407,3406,2231,37,3210,3405,1261,183,2416,81,601],"class_list":["post-731","jobpost","type-jobpost","status-publish","hentry","jobpost_category-it","jobpost_job_type-remote","jobpost_tag-advanced-scripting","jobpost_tag-check-point","jobpost_tag-cissp","jobpost_tag-contract-to-hire","jobpost_tag-cybersecurity-engineer","jobpost_tag-forensics","jobpost_tag-incident-response","jobpost_tag-linux","jobpost_tag-malware-analysis","jobpost_tag-remote","jobpost_tag-windows"],"_links":{"self":[{"href":"https:\/\/skillbasedmatching.com\/jobs\/wp-json\/wp\/v2\/jobpost\/731","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/skillbasedmatching.com\/jobs\/wp-json\/wp\/v2\/jobpost"}],"about":[{"href":"https:\/\/skillbasedmatching.com\/jobs\/wp-json\/wp\/v2\/types\/jobpost"}],"author":[{"embeddable":true,"href":"https:\/\/skillbasedmatching.com\/jobs\/wp-json\/wp\/v2\/users\/1"}],"wp:attachment":[{"href":"https:\/\/skillbasedmatching.com\/jobs\/wp-json\/wp\/v2\/media?parent=731"}],"wp:term":[{"taxonomy":"jobpost_category","embeddable":true,"href":"https:\/\/skillbasedmatching.com\/jobs\/wp-json\/wp\/v2\/jobpost_category?post=731"},{"taxonomy":"jobpost_job_type","embeddable":true,"href":"https:\/\/skillbasedmatching.com\/jobs\/wp-json\/wp\/v2\/jobpost_job_type?post=731"},{"taxonomy":"jobpost_location","embeddable":true,"href":"https:\/\/skillbasedmatching.com\/jobs\/wp-json\/wp\/v2\/jobpost_location?post=731"},{"taxonomy":"jobpost_tag","embeddable":true,"href":"https:\/\/skillbasedmatching.com\/jobs\/wp-json\/wp\/v2\/jobpost_tag?post=731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}