Cyber Security Engineer
Listed on 2026-03-14
-
IT/Tech
Cybersecurity, Network Security
Job Description
Job Title: Cyber Security Engineer
Location: Hauppauge, NY (Long Island)
Schedule: Onsite Mon‑Fri 9:00 AM‑5:00 PM during training; after training, transition to a hybrid shift 2:00 PM‑10:00 PM.
After‑hours on‑call rotation and Incident Response Team participation included.
Visa Sponsorship and relocation: not available. Applicants must reside within an hour commute of the job location.
Ready to Get Started?
Acture Solutions is looking for a motivated and service‑minded Cyber Security Engineer to support our Security Operations Center (SOC) and customer environments by monitoring, investigating, and responding to security events while continuously improving security posture across client networks. This customer‑facing role requires strong technical expertise, excellent communication skills, and the ability to manage multiple priorities in a fast‑paced environment. You will also serve as an escalation point for SOC Analysts, contribute to process improvements, and participate in an after‑hours on‑call rotation and incident response coverage with additional compensation for time worked outside regular business hours.
WhatYou’ll Do
- Serve as an escalation point for SOC Analysts by providing technical guidance and support on complex security investigations.
- Help define, document, and improve SOC processes and procedures to ensure consistent, high‑quality security operations.
- Provide recommendations to leadership and customers to strengthen security posture, reduce risk, and improve resiliency.
- Partner with internal teams, clients, and vendors to drive resolution of high‑priority security issues and coordinate security initiatives.
- Uphold and exemplify Acture’s Core Values:
Accountability, Customer First, Trust, Integrity, Opportunity, Nurturing Positive Culture & Fun. - Investigate and determine root cause of all security alarms at any threat level and provide supporting research.
- Manage daily security operations in accordance with SLAs, severity‑based prioritization, and escalation requirements.
- Own and support customer network security posture across perimeter, internal network, and cloud connectivity, ensuring confidentiality, integrity, and availability.
- Assess, deploy, monitor, manage, and maintain network security controls including next‑gen firewalls (NGFW), IDS/IPS, web filtering, VPN concentrators, WAF (where applicable), and security appliances across customer environments.
- Configure, harden, and validate firewall policies (least privilege, object/group standards, rule lifecycle management), including NAT, geo/IP reputation controls, application control, SSL inspection (where approved), and logging requirements.
- Design and maintain secure network segmentation (VLANs, ACLs, inter‑VLAN routing controls) to limit lateral movement and isolate critical assets (servers, backups, OT/IoT, guest/wireless).
- Support and improve secure remote access including site‑to‑site VPN, client VPN, MFA integrations, certificate‑based authentication, and conditional access alignment.
- Monitor and analyze network telemetry across environments using SIEM/XDR/NDR tools; triage and investigate alerts related to network‑based threats (command‑and‑control, beaconing, lateral movement, brute force, anomalous authentication, DNS abuse).
- Perform packet‑level and log‑level troubleshooting (PCAPs, Net Flow, DNS logs, firewall logs, proxy logs) to determine root cause, scope, and containment actions.
- Scan for vulnerabilities and misconfigurations affecting network and perimeter systems (firewalls, switches, routers, wireless controllers, VPNs); coordinate remediation across systems, tools, and customer technologies.
- Investigate and remediate threats, including performing incident response tasks as part of the Incident Response Team; execute containment actions such as blocking malicious IPs/domains, disabling compromised accounts, isolating hosts, and tightening access paths.
- Research adversary activity and generate correlation, detection, and suppression rules to improve alert quality and SOC efficiency, including network‑focused detections (impossible travel, unusual egress, port/protocol anomalies,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).