×
Register Here to Apply for Jobs or Post Jobs. X

Senior Cybersecurity Engineer

Job in Dallas, Dallas County, Texas, 75215, USA
Listing for: Aprio
Full Time position
Listed on 2026-01-12
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer, Security Manager
Salary/Wage Range or Industry Benchmark: 125000 - 150000 USD Yearly USD 125000.00 150000.00 YEAR
Job Description & How to Apply Below

Work with a nationally ranked CPA and advisory firm that is passionate for what's next. Aprio has 30 U.S. office locations, one in the Philippines and more than 2,100 team members that speak 60+ languages across the globe. By bringing together proven expertise, deep understanding, and strategic foresight for fast-growing industries, Aprio ensures clients are prepared for wherever life or business may take them.

Discover a top-rated culture, vast growth opportunities and your next big career move with Aprio.

Join Aprio's
information Technology team and you will help clients maximize their opportunities.

Aprio is a progressive, fast-growing firm looking for a Senior Cybersecurity Engineer to join their dynamic team.

Aprio operates a dedicated regulated cloud environment to support Controlled Unclassified Information (CUI) and meet CMMC requirements. This role is hands‑on and execution-focused: you will implement, operate, and continuously improve the security controls that protect the CUI boundary and keep the environment audit‑ready.

You will support the day-to-day security engineering and operations for Aprio’s CMMC‑aligned regulated cloud environment. You’ll take architecture standards and compliance requirements and turn them into reliable configurations, repeatable deployments, measurable control health, and clean evidence.

Position Responsibilities:
  • Security control implementation:
    Implement and operate security controls across identity, network, compute, storage, key management, endpoint security, logging, and monitoring within the CUI boundary.
  • Access and privilege management:
    Administer role‑based access, privileged access workflows, MFA/conditional access enforcement, service account governance, and secrets/cert lifecycle tasks.
  • Configuration baseline and hardening:
    Apply and maintain secure configuration baselines for in‑scope systems and services. Investigate drift, remediate misconfigurations, and document exceptions with approvals.
  • Logging and detection operations:
    Ensure required logging is enabled and flowing to centralized monitoring. Help tune detections, investigate alerts, and support incident response procedures specific to the CUI environment.
  • Vulnerability and patch execution:
    Run vulnerability scans (or validate results), track remediation, coordinate patching, and verify closure. Manage remediation SLAs and support risk‑based prioritization.
  • Change control support:
    Participate in change reviews for CUI‑scoped systems, assess security impact, implement approved changes, and validate post‑change security posture.
  • Evidence collection and audit readiness:
    Produce and maintain audit evidence (config snapshots, access reviews, logging verification, vulnerability reports, change records). Keep evidence organized, complete, and easy to validate.
  • Automation and reliability:
    Build lightweight automation to reduce manual work (repeatable deployments, configuration validation, evidence collection) and improve consistency without introducing risk.
  • Partner enablement:
    Support IT and delivery teams working inside the boundary by providing secure implementation guidance, troubleshooting, and clear “how‑to” documentation.
What success looks like:
  • First 30–60 days:
    You can operate the environment safely, understand the boundary, and execute core security tasks (access, logging, vuln/patch, evidence) with minimal supervision.
  • By 90 days:
    Control operations are predictable: low drift, reliable logging, consistent remediation cadence, and clean evidence artifacts that map to control outcomes.
  • By 6–12 months:
    You’ve helped reduce manual effort through repeatability and automation, improved control health metrics, and strengthened day‑to‑day operational resilience.
Required Qualifications:
  • 4+ years in security engineering, cloud engineering, or security operations with hands‑on responsibility for implementing controls.
  • Experience working in regulated or compliance‑driven environments (CMMC, NIST 800‑171, NIST 800‑53, FedRAMP‑aligned environments, SOC 2, ISO 27001, or similar).
  • Strong fundamentals in identity and access management, network segmentation concepts, encryption/key management basics, and centralized…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary