SUMMARY OF RESPONSIBILITIES
The Cybersecurity Engineer is responsible for assisting in designing, implementing, and maintaining robust security solutions to protect the organization's infrastructure, applications, and data. This role collaborates with cross-functional teams to engineer secure systems, perform threat modeling, automate security operations, and lead vulnerability remediation efforts. The ideal candidate will proactively improve the security posture of the organization and respond to advanced threats and vulnerabilities in a scalable and efficient manner.
ESSENTIAL DUTIES
Security Architecture & Design
- Assist in Architecting and implementing cybersecurity solutions across cloud and on-premises environments.
- Assist in Design and maintenance of secure configurations for systems, networks, and applications following industry best practices (CIS benchmarks, NIST, ISO 27001, etc.).
- Conduct security architecture reviews and risk assessments of third-party systems and applications.
- Support the design and enforcement of enterprise-wide security policies and access controls.
- Analyze and improve the organization’s Azure and O365 Secure Scores, applying technical changes to remediate risk.
Security Operations & Incident Management
- Coordinate SecOps efforts with the Operations group to achieve interdepartmental synergy around vulnerability controls and remediations.
- Lead the technical response to high-critical security incidents and alerts from systems including Microsoft Defender, Microsoft 365 Security Center, and Cloud App Security (CAS).
- Stay current with emerging threats, vulnerabilities, and security technologies to continuously evolve defense mechanisms.
Engineering & Automation
- Assist in Developing and managing security infrastructure tools and endpoint protection platforms.
- Engineer automated processes for vulnerability detection, remediation, and compliance reporting using tools such as for Microsoft solutions and other areas needing secure
- Collaborate with the IT and DevOps teams to embed security into CI/CD pipelines, infrastructure as code (IaC), and application development processes.
Documentation, Governance & Mentorship
- Write and maintain detailed technical documentation, architectural diagrams, and playbooks for incident response and system hardening.
- Provide mentoring and technical guidance to junior analysts or engineers as needed.
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
WORKING CONDITIONS
- Primarily working indoors, office environment.
- May sit for several hours at a time.
- Prolonged exposure to computer screens.
- Repetitive use of hands to operate computers, printers, and copiers.
REQUIRED EDUCATION & EXPERIENCE
- Bachelor’s degree in Cybersecurity, Computer Engineering, Information Systems, or related field, or equivalent practical experience.
- 5 years of hands-on experience in cybersecurity engineering, security operations, or infrastructure security.
- Industry certifications such as Microsoft, CompTIA, and (ISC)2
- Strong technical experience with Microsoft Defender XDR.
- Expertise in endpoint security tools, vulnerability management systems (e.g., Qualys, Tenable), and SIEMs (e.g., Sentinel, Splunk).
- Proficiency in scripting languages (e.g., PowerShell, Python, or Bash) for automation.
- Solid understanding of network protocols, security controls, and secure system administration (Windows/Linux/Mac).
- Running training simulations and campaigns for phishing and cyber awareness programs
- Use of Purview and locking down data and data retrieval.
- Be able to understand, architect, and run audits of all areas of identities and data.
- Understanding, Architecting, deploying Cyber Incidence Response Plans as well as procedures
PREFERRED EDUCATION & EXPERIENCE
- Familiarity with Dev-SecOps practices and tools (e.g., GitHub Actions, Azure DevOps, Atlassian).
- Experience in securing Microsoft 365 and Azure environments including Defender XDR, Microsoft Purview, Exchange Online, and Entra ID.
- Experience with Active Directory hardening and security policy implementation.
- Background in eDiscovery, DSR, and compliance frameworks (GDPR, CCPA, HIPAA, SOC 2).
- Experience with penetration Testing and be able to remediate findings.
- Worked with 3rd Party Vender Management Platforms, such as BitSight and Secure Scorecard
REQUIRED KNOWLEDGE
- Cybersecurity Engineering – Strong knowledge of security frameworks, tools, and system design to mitigate threats across all layers (network, application, endpoint, data).
- Threat Modeling – Ability to assess complex systems and anticipate threat vectors.
- Automation and Scripting – Skilled in writing scripts to support monitoring, remediation, and reporting.
- Problem Solving – Analytical skills to resolve complex security challenges and identify root causes of incidents.
- Collaboration – Work effectively across teams to build secure architectures and support business goals.
- Documentation – Ability to produce accurate, detailed technical documentation and reports.
- BYOD management – Understand how to enforce policies and packages through MDM utilities
REQUIRED SKILLS
- Cybersecurity Engineering – Strong knowledge of security frameworks, tools, and system design to mitigate threats across all layers (network, application, endpoint, data).
- Threat Modeling – Ability to assess complex systems and anticipate threat vectors.
- Automation and Scripting – Skilled in writing scripts to support monitoring, remediation, and reporting.
- Problem Solving – Analytical skills to resolve complex security challenges and identify root causes of incidents.
- Collaboration – Work effectively across teams to build secure architectures and support business goals.
- Documentation – Ability to produce accurate, detailed technical documentation and reports.
WORK STYLES & BEHAVIORS
- Attention to Detail – Ability to design and deploy secure configurations with precision.
- Initiative – Self-starter who proactively identifies risks and implements solutions.
- Adaptability – Comfortable navigating evolving technologies and rapidly changing threat landscapes.
- Communication – Able to clearly communicate technical concepts to both technical and non-technical audiences.
- Leadership – Willingness to mentor others and drive security best practices across the organization.
FirstKey Homes is an equal opportunity employer and will not tolerate discrimination in employment on the basis of race, color, age, sex, sexual orientation, gender identity or expression, religion, disability, ethnicity, national origin, marital status, veteran status, genetic information or any other legally protected classification or status.