Position

Cybersecurity Engineer (Checkpoint)

Posted

22-Nov-2025

Location

York, Pennsylvania

Category

Other

Remote Friendly

Remote

Work Type

Contract To Hire

Reference

Salary Range

228050

$ 0 - $ 0

Duration: 3 months to start

Job Description          
General Summary
  • Provides advanced level technical knowledge and expertise with system and network security.
  • Makes enhancements to existing monitoring and security operations.
  • Contributes to a continuous monitoring program framework.
  • Monitors established network and security policies, procedures, and standards to ensure conformance with information services objectives.
  • Develops and maintains various daily reports for audit review (security and change management).
  • Participates with the deployment and operation of information security systems, including integration, testing, troubleshooting, and updating/upgrading of various security tools and appliances such as anti-virus, IPS, malware detection tools, DLP, Identity and access management and encryption tools.
  • Is a key participant/operator in incident response activities to include incident reporting, enterprise coordination, incident resolution management, isolation activities, containment, eradication and recovery activities, and provides forensic analysis for incidents.
  • Coordinates with peers in the organizations outside of the system to form relationships to share incident activity and enhance strategic and tactical protection posture.

Duties and Responsibilities:
Essential Functions: Common Expectations: Required for All Jobs:
The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities, duties, and skills required of personnel so classified.

Qualifications
Minimum Education: Work Experience: Courses and Training: Knowledge, Skills, and Abilities:
  • Provides appropriate updates and metrics to leadership regarding security event handling, trends, analysis, incident response resolutions and lessons learned
  • Monitors information systems and services to audit and maintain security controls to ensure compliance with regulatory policies and industry best practices.
  • Identifies potential security gaps and articulates enterprise risk.
  • Makes enhancements to existing monitoring and security operations, based on identified risks.
  • Responsible for writing the architectural and functional specifications including, but not limited to overall system design, applications, and/or operating system environments as it relates to security and data flows.
  • Meets defined deliverable deadlines for projects and other assignments.
  • Provides advanced expertise around the analysis of malware, suspicious emails, and writes protection signatures.
  • Possesses advanced knowledge of common application-level protocols (i.e. SMTP, SSH, HTTPS, FTP) and network fundamentals (routing, switching).
  • Advanced understanding of Linux and/or Windows administration.
  • Advanced scripting knowledge (i.e. Bash, VBScript, Perl, PHP, etc.)
  • Strong attention to detail with an analytical mind and outstanding problem-solving skills.
  • Advanced awareness and understanding of cybersecurity trends and hacking techniques.
  • Provides advanced technical support, to ensure that critical and urgent support cases are handled appropriately.
  • Ability to troubleshoot both cybersecurity and network issues.
  • Provides consultation on complex projects and is the top-level contributor/expert.
  • Identifies malicious, illegal or any other activity that does not fit within the System IT Policy guidelines and reports to leadership.
  • Participates in tactical efforts to stem attacks and malicious activities.
  • Provides after hours, on-call support as needed
  • Maintains established policies and procedures, objectives, quality assessment and safety standards
  • Enhances professional growth and development through participation in educational programs, current literature, in-service meetings, and workshops.
  • Provides outstanding service to all customers; fosters teamwork; and practices fiscal responsibility through improvement and innovation.
  • Performs other related duties as identified.
  • The organization has adopted and implemented a compliance program to support their values and standards for professionalism, integrity, and ethics. Expected to support and meet the values and standards of the organization and the performance expectations of the job, the department, and the compliance program.
  • The organization has adopted and implemented a privacy program to safeguard the patient information and the business and operational information of the organization. Expected to support and meet the values and standards of the organization to safeguard patient and business/operational information.
  • Standing - Occasionally
  • Walking - Occasionally
  • Sitting - Frequently
  • Reaching - Rarely
  • Talking - Frequently
  • Hearing - Frequently
  • Repetitive Motions - Occasionally
  • Eye/Hand/Foot Coordination - Occasionally
  • Associates Degree Required and Bachelors Degree is preferred
  • 5 or more years of Information Technology experience with 3+ years of enterprise information system security experience is required
  • Prior experience in banking, government or health care security procedures, matrix specifically with a network and/or security engineering focus is preferred
  • CISSP, ISSA, CCSP or related security certification(s) Upon Hire Required
  • Excellent interpersonal and written communication skills.
#LI-Remote

Talent Groups is an equal opportunity employer. Our goal is to promote an environment that helps our employees and clients appreciate the benefits that diversity provides.

APPLY NOW
Share this job
Interested in this job?
Save Job
CREATE AS ALERT

Similar Jobs

Recruiter Name: Katie Bethel

Recruiter Email:  katie.bethel@talentgroups.com

SCHEMA MARKUP ( This text will only show on the editor. )