Senior Cybersecurity Engineer
Listed on 2026-01-12
-
IT/Tech
Cybersecurity, Systems Engineer, Security Manager
Work with a nationally ranked CPA and advisory firm that is passionate for what's next. Aprio has 30 U.S. office locations, one in the Philippines and more than 2,100 team members that speak 60+ languages across the globe. By bringing together proven expertise, deep understanding, and strategic foresight for fast-growing industries, Aprio ensures clients are prepared for wherever life or business may take them.
Discover a top-rated culture, vast growth opportunities and your next big career move with Aprio.
Join Aprio's
information Technology team and you will help clients maximize their opportunities.
Aprio is a progressive, fast-growing firm looking for a Senior Cybersecurity Engineer to join their dynamic team.
Aprio operates a dedicated regulated cloud environment to support Controlled Unclassified Information (CUI) and meet CMMC requirements. This role is hands‑on and execution-focused: you will implement, operate, and continuously improve the security controls that protect the CUI boundary and keep the environment audit‑ready.
You will support the day-to-day security engineering and operations for Aprio’s CMMC‑aligned regulated cloud environment. You’ll take architecture standards and compliance requirements and turn them into reliable configurations, repeatable deployments, measurable control health, and clean evidence.
Position Responsibilities:- Security control implementation:
Implement and operate security controls across identity, network, compute, storage, key management, endpoint security, logging, and monitoring within the CUI boundary. - Access and privilege management:
Administer role‑based access, privileged access workflows, MFA/conditional access enforcement, service account governance, and secrets/cert lifecycle tasks. - Configuration baseline and hardening:
Apply and maintain secure configuration baselines for in‑scope systems and services. Investigate drift, remediate misconfigurations, and document exceptions with approvals. - Logging and detection operations:
Ensure required logging is enabled and flowing to centralized monitoring. Help tune detections, investigate alerts, and support incident response procedures specific to the CUI environment. - Vulnerability and patch execution:
Run vulnerability scans (or validate results), track remediation, coordinate patching, and verify closure. Manage remediation SLAs and support risk‑based prioritization. - Change control support:
Participate in change reviews for CUI‑scoped systems, assess security impact, implement approved changes, and validate post‑change security posture. - Evidence collection and audit readiness:
Produce and maintain audit evidence (config snapshots, access reviews, logging verification, vulnerability reports, change records). Keep evidence organized, complete, and easy to validate. - Automation and reliability:
Build lightweight automation to reduce manual work (repeatable deployments, configuration validation, evidence collection) and improve consistency without introducing risk. - Partner enablement:
Support IT and delivery teams working inside the boundary by providing secure implementation guidance, troubleshooting, and clear “how‑to” documentation.
- First 30–60 days:
You can operate the environment safely, understand the boundary, and execute core security tasks (access, logging, vuln/patch, evidence) with minimal supervision. - By 90 days:
Control operations are predictable: low drift, reliable logging, consistent remediation cadence, and clean evidence artifacts that map to control outcomes. - By 6–12 months:
You’ve helped reduce manual effort through repeatability and automation, improved control health metrics, and strengthened day‑to‑day operational resilience.
- 4+ years in security engineering, cloud engineering, or security operations with hands‑on responsibility for implementing controls.
- Experience working in regulated or compliance‑driven environments (CMMC, NIST 800‑171, NIST 800‑53, FedRAMP‑aligned environments, SOC 2, ISO 27001, or similar).
- Strong fundamentals in identity and access management, network segmentation concepts, encryption/key management basics, and centralized…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).