×
Register Here to Apply for Jobs or Post Jobs. X

Cybersecurity Engineer, National WWII Museum - Orleans, LA

Job in New Orleans, Jefferson Parish, Louisiana, 70123, USA
Listing for: Southeastern Museums Conference
Full Time position
Listed on 2026-01-19
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer, Network Security
Salary/Wage Range or Industry Benchmark: 100000 - 125000 USD Yearly USD 100000.00 125000.00 YEAR
Job Description & How to Apply Below
Position: Cybersecurity Engineer, The National WWII Museum - New Orleans, LA
Location: New Orleans

Cybersecurity Engineer, The National WWII Museum - New Orleans, LA

The National WWII Museum is currently seeking a Cybersecurity Engineer. The Cybersecurity Engineer is responsible for the day-to-day execution and continuous improvement of the National WWII Museum’s cybersecurity program, including security monitoring, vulnerability management, incident response, and implementation of security controls. This role serves as the technical owner of cybersecurity controls and the primary escalation point for security incidents, operating with delegated authority from the Vice President of Information Technology.

Working closely with IT teams, the Cybersecurity Engineer translates security priorities into practical, effective technical protections that reduce risk and strengthen the organization’s overall security posture. The role operates under the strategic direction and governance of the Vice President of Information Technology and ensures alignment with industry standards and best practices, including the NIST Cybersecurity Framework.

Unlike an analyst role focused primarily on monitoring and reporting, this position is responsible for the engineering, implementation, and continuous improvement of the Museum’s security controls.

Requirements Security Operations & Monitoring
  • Monitor and triage security alerts from endpoint protection, identity platforms, and logging systems
  • Investigate and respond to security incidents in coordination with IT Infrastructure
  • Maintain incident documentation and post-incident remediation tracking
Vulnerability Management
  • Operate routine vulnerability scanning across servers, endpoints, network devices, and supported systems
  • Testing, identifying, and remediating system and network vulnerabilities through continuous vulnerability management
  • Prioritize findings based on risk, exploitability, threat intelligence, and business impact, and document accepted risk where remediation is deferred
  • Coordinate remediation with Infrastructure and Application teams
  • Track vulnerabilities through closure
Endpoint & Identity Security
  • Own endpoint security tooling health, configuration, and tuning
  • Enforce MFA, Conditional Access, and service account hygiene
  • Ensure security controls are consistently implemented across endpoints, servers, networks, and cloud services
  • Lead privileged access reviews and remediation
Infrastructure & Network Security Support
  • Partner with Infrastructure to improve network segmentation and reduce lateral movement
  • Lead firewall rule review, validation, and documentation
  • Ensure secure configuration of kiosks, AV systems, and operational technology where feasible
  • Designing, implementing, and upgrading security measures to protect organizational data, infrastructure, and networks
Logging & Forensic Readiness
  • Expand log coverage to support investigation and compliance needs
  • Ensure logs are retained and accessible for incident analysis
  • Support SIEM-lite or centralized logging improvements
  • Translate NIST-aligned requirements into operational controls
  • Participate in tabletop exercises and recovery testing
  • Recommend improvements based on threat intelligence and incident trends
  • Contribute to risk assessments, security metrics, and executive reporting
  • Assist in maintaining cybersecurity policies, standards, and technical procedures
Change Management
  • Participating in the change management processes to ensure new systems and changes meet security requirements before deployment

Perform other duties as assigned.

Qualifications
  • 3–7 years of Experience operating in a multi-site or hybrid environment with a mix of on-premises and cloud infrastructure
  • Demonstrated ability to translate technical risk into business-relevant language for non-technical stakeholders
  • Demonstrated experience designing, implementing, and improving security controls, not only monitoring or reporting
  • Hands‑on experience with:
    Endpoint Detection & Response (EDR) platforms, Vulnerability scanning and remediation workflows, Identity & Access Management, MFA, and Conditional Access and Windows operating systems and network security fundamentals
  • Proven ability to lead technical incident response, including containment and remediation
  • Experience…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary