Sr. Security Engineer
Listed on 2026-03-12
-
IT/Tech
Cybersecurity, IT Consultant
Pay Range: $52.50 - $62.50
- Works with the technical team to recover data after a security breach.
- Configures and installs firewalls and intrusion detection systems.
- Develops automation scripts to handle and track incidents.
- Investigates intrusion incidents, conducts forensic investigations and mounts incident responses.
- Delivers technical reports and formal papers on test findings.
- Installs firewalls, data encryption, and other security measures.
- Maintains access by providing information, resources, and technical support.
- Ensures authorized access by investigating improper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements.
- Updates job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations.
- Accomplishes information systems and organization mission by completing related results as needed.
- Builds, deploys, and tracks security measurements for computer systems and networks.
- Mitigates security vulnerabilities by implementing applicable solutions and tools.
- Performs vulnerability testing, risk analyses, and security assessments.
- Collaborates with colleagues on authentication, authorization, and encryption solutions.
- Tests security solutions using industry standard analysis criteria.
- Responds to information security issues during each stage of a project's lifecycle.
- Performs risk assessments and testing of data processing systems.
- Establishes system controls by developing framework for controls and levels of access; recommending improvements.
- Establishes computer and terminal physical security by developing standards, policies, and procedures; coordinates with facilities security; recommends improvements.
- Safeguards computer files by performing regular backups; developing procedures for source code management and disaster preparedness; recommends improvements.
- Determines the sensitivity of the data in order to recommend the appropriate security needs.
- Develops proposals for and considers cost effective equipment options to satisfy security needs.
- Communicates with the technical team, management team and users company wide if data security is breached.
- Designs infrastructure to alert the technical team of detected vulnerabilities.
- Evaluates new technologies and processes that enhance security capabilities.
- Supervises changes in software, hardware, facilities, telecommunications and user needs.
- Defines, implements, and maintains corporate security policies.
- Analyzes and advises on new security technologies and program conformance.
- Creates, tests, and implements network disaster recovery plans.
- Recommends security enhancements and purchases.
- Trains staff on network and information security procedures.
- Develops security awareness by providing orientation, educational programs, and on-going communication.
- Recommends modifications in legal, technical and regulatory areas that affect IT security.
- Microsoft Intune
- Microsoft Bit Locker Administrator
- Microsoft Purview
- Microsoft 365
- Microsoft Azure
Are you seeking to work on a team of professionals protecting one of the world's largest global air lines? As a Data Protection Engineer at
* you'll be collaborating with multiple teams to support data protection. You'll have the opportunity to contribute to an expanding Data Protection program and assist in implementing best practices.
As a Data Protection Engineer, you will implement solutions to help safeguard
* most sensitive data. You will be responsible for architecting, implementing, documenting, and maintaining Data Protection technologies such as Bit Locker endpoint encryption. The Data Protection team seeks a self-motivated, flexible individual who is always looking for a way to improve and protect our environment.
- Lead the implementation and migration to Microsoft Intune at an enterprise scale.
- Design and implement security policies and configurations for device management with Microsoft Intune.
- Recommend best practices and test new features of the product.
- Provide training and support to partner teams and end users on new security features.
- Collaborate with business partners who could benefit from the new tools, assisting with implementing new use cases.
- Continuously monitor and optimize the performance and security of the solution.
- Administer data protection tools including patching, upgrading, troubleshooting, testing and report generation.
- Develop new policies using regex, machine learning, fingerprinting, and/or dictionaries to monitor unique data types.
- Review existing deployment architecture, engineering, and policies and assess overall deployment against best practices.
- Evaluate and build new data protection solutions in alignment with cloud requirements. Operationalize these solutions to deliver value to the business.
- Implement protective controls in the cloud to ensure the confidentiality, integrity, and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).