The Cybersecurity Engineer is an expert cybersecurity professional tasked with managing and supporting complex client operating system environments. This role ensures high levels of system availability and performance while incorporating threat intelligence to identify emerging risks and adversary activity. The Cybersecurity Engineer plays a critical role in strengthening the organization’s cybersecurity posture through advanced threat detection, threat intelligence analysis, incident response, and security infrastructure management.
Minimum of 3+ years of experience in cybersecurity, with at least 2 years in Threat Intelligence role.
Demonstrated expertise in threat intelligence analysis, including adversary tracking, IOC analysis, and threat campaign investigation.
Experience in threat hunting, intelligence-driven detection development, and applying threat intelligence to strengthen security controls.
Computer Science, Engineering, IT bachelor's degree or equivalent working experience.
Have at least one of the following certifications: GIAC (GCTI, GCIA, or GCIH), Microsoft (AZ-500, SC-200 or SC-300), AWS (Security Specialty), EC-Council (Ethical Hacker, Network Defense) or similar certification.
Additional certifications related to Threat Intelligence or Incident Response are advantageous.
Knowledge of ITIL Framework: In-depth understanding and practical application in infrastructure and security operations.
Knowledge in infrastructure operations management.
Knowledge in patching & remediation cycles.
Knowledge of Active Directory services (on premise & Azure).
Proven experience in cybersecurity engineering with strong understanding of threat intelligence processes, adversary tactics, and evolving threat landscape.
Experience with security tools such as firewalls, intrusion detection/prevention systems, endpoint protection platforms, SIEM solutions, and threat intelligence platforms.
Knowledge of Microsoft Office 365 & Microsoft Security applications.
Knowledge of Security Incident Management.
Microsoft Security Associate Certified (one of the following: SC200, SC300, or AZ500).
Knowledge of IT Security Auditing.
Strong analytical skills for correlating threat intelligence with operational security data.
Knowledge of NIST 800-53, CIS Controls, ISO-27000, PCI DSS and GDPR.
Threat Intelligence Analysis: Strong capability to collect, enrich, correlate, and operationalize threat intelligence from multiple sources.
Ability to map security incidents, intelligence findings, and adversary tactics, techniques, and procedures (TTPs) to the MITRE ATT&CK matrix.
Monitoring & Analysis Tools: Advanced proficiency with SIEM platforms (e.g., MS Sentinel), EDR solutions, and threat intelligence platforms.
Incident Response Techniques: Expertise in incident handling, containment, eradication, and recovery techniques.
Collect, analyze, and operationalize threat intelligence from internal telemetry, OSINT, and commercial intelligence feeds.
Identify adversary tactics, techniques, and procedures (TTPs) and translate intelligence into actionable detection use cases.
Manage and integrate threat intelligence indicators (IOCs) into SIEM, EDR, and security monitoring platforms.
Conduct proactive threat hunting activities based on threat intelligence and emerging adversary campaigns.
Collaborate with SOC and incident response teams to enrich investigations with intelligence context and adversary attribution.
Support and monitor endpoint, network, and cloud security platforms (EDR, NDR, firewalls, email security, identity platforms, SIEM, XDR).
Maintain and optimize threat intelligence platforms and integrations (e.g., TIP, IOC feeds, automation workflows).
Assist with vulnerability analysis by correlating threat intelligence with emerging exploitation trends and threat actor activity.
Produce threat intelligence reports, briefings, and strategic assessments for internal stakeholders and clients.
Communicate effectively to identify root causes and provide intelligence-driven recommendations for security improvements.
Assist with the design, documentation, and enforcement of threat intelligence processes, procedures, and security policies.
Collaborate with IT and security teams to ensure security controls and asset management processes incorporate threat intelligence insights.
Participate in an on-call rotation as needed for supporting security monitoring and incident response activities.
#LI-FV1
Auxis prioritizes employee growth and development to help you advance your career. Auxis’ culture empowers you to be your best in the interest of a common team goal. We are constantly striving to improve our culture and environment and have invested in tools to continue to have better visualization of the pulse of our organization.
Benefits
Software Powered by iCIMS
www.icims.com