drjobs Senior Cybersecurity Engineer

Senior Cybersecurity Engineer

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Houston - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Description

Waste Management (WM) a Fortune 250 company is the leading provider of comprehensive waste and environmental services in North America. We are strongly committed to a foundation of operating excellence professionalism and financial strength. WM serves nearly 25 million customers in residential commercial industrial and municipal markets throughout North America through a network of collection operations transfer stations landfills recycling facilities and waste-based energy production projects.

To enable our business to expand our lead in a market increasingly enhanced by technology Waste Management is undertaking a substantial technology transformation. We are seeking talented Information Technology professionals to join the Waste Management team who are motivated to help us transform the way we design build and use technology. With your skills and experience we look for you to combine your technical expertise with industry best practices in an effort to align information technology solutions with Waste Management business strategy.

I. Job Summary
As a Senior Security Analyst (Engineering) you will support the strategic development and execution of the organizations security technology roadmap. This role is centered on building a scalable future-ready security stack through disciplined technology hygiene seamless tool integrations and timely upgrades.
You will be responsible for managing and growing a high-performing team of security engineers fostering a culture of innovation accountability and continuous improvement. Your leadership will ensure the team remains aligned with long-term security objectives while staying agile in response to evolving threats and business needs.

In this position you will drive the design optimization and lifecycle management of the security technology stackk. You will lead integration efforts to enhance interoperability and reduce complexity across the security ecosystem while ensuring consistent technology hygiene through proactive maintenance and upgrades. By identifying capability gaps and guiding the evolution of the security architecture you will help shape a resilient and adaptive security posture. Additionally you will mentor and develop engineering talent scaling the team to support organizational growth and maturity. Your work will directly influence the agility resilience and long-term effectiveness of the enterprises security infrastructure.

Duties and Responsibilities

To perform this job successfully an individual must be able to perform each duty satisfactorily. Other ancillary duties may be assigned.

  • Responsible for the design and implementation of secure email gateways (e.g. Microsoft ProofPoint or Mimecast) email filtering SPF/DKIM/DMARC sandboxing and related technologies including cloud-based email threat prevention platforms.
  • Design and implement security systems that prioritize accuracy depth and resilience. Continuously validate data integrity and system behavior using engineered baselines and anomaly detection to surface deviations early in the lifecycle of potential threats.
  • Routinely evaluate and recommend adoption enhancement or replacement of security-related hardware and software solutions to strengthen the organizations security posture. Standup manage and complete Proof-of-Concept (POC) and Proof-of-Value (POV) exercises and security vendors and providers.
  • Work alongside others to establish and maintain detection pipelines by engineering integrations across the organizations security fabric. Develop and refine telemetry ingestion parsing and correlation logic to ensure accurate identification of malicious activity to support scalable automated incident response across the enterprise.
  • Develop and review secure architecture patterns for new systems applications and infrastructure. Ensure that security is embedded into the design phase by collaborating with solution architects and developers to implement secure-by-design principles.
  • Engineer and automate routine security operation and remediation workflows across endpoints servers containers and cloud environments leveraging Security Orchestration and Automated Response (SOAR) solutions as well as agentic solutions. Analyze results prioritize findings based on risk and coordinate with system owners to implement long-term fixes.
  • Collaborate to enhance detection content improve monitoring coverage and refine operational proceduresincluding runbooks standards and response workflowsto ensure consistent and effective threat management.
  • Facilitate coordination and resolution of Level 2 and Level 3 security technology disruptions and outages.
  • Provides analysis and support for general infrastructure planning and design to meet security objectives.
  • Stay current on cybersecurity threat landscape threat actor and technology trends to proactively evolve security strategies
  • Apply creative problem-solving and strong collaboration skills to work closely with IT operations and engineering teams delivering clear and actionable remediation guidance that addresses root causes and strengthens the organizations overall security posture.
  • Establish and maintain a structured upgrade and hygiene program to ensure all existing and newly deployed security solutions are regularly updated patched and aligned with industry best practices and organizational security standards.
  • Off hours support required due to the 24x7 nature of this team via a call tree/on-call schedule.

III. Supervisory Responsibilities
May coach and mentor less-experienced analysts and act as team leader on systems projects.

IV. Qualifications

The requirements listed below are representative of the qualifications necessary to perform the job.

A. Education and Experience

  • Education: Bachelors degree (accredited) in Computer Science MIS Business Administration or similar area of study or in lieu of degree High School Diploma or GED (accredited) and 4 years or relevant work experience.
  • Experience: Five years of relevant work experience (in addition to education requirement).

B. Certificates Licenses Registrations or Other Requirements
Preferred certifiations:

  • Certified Information Systems Security Professional (CISSP)
  • Certified Information Systems Auditor (CISA)
  • Certified Information Security Manager (CISM)
  • Other professional certifications include: CEH GCIH.
  • Other vendor certifications desired include: CCNA CCNP CCSP MSCE

C. Other Knowledge Skills or Abilities Required

Advanced knowledge or skills in one or more of the following is required:

  • Exceptional communication skillswritten verbal and active listeningto effectively convey complex technical information and ensure clarity and alignment in high-pressure or fast-paced security operations environments.
  • Functional knowledge of modernin cybersecurity technology including M365 Security Email security Gateways automation platforms and artificial intelligence solutions
  • Exposure and familiarity in developing general security operations procedures and optimizing existing processes.
  • Technical skills across a broad range of computing platforms and network protocols.
  • Experience in several or more of the following technologies: Firewalls Intrusion Prevention Vulnerability Scanning Data Loss Prevention Email Security Endpoint Security DNS Web Content Filtering SIEM Certificates and encryption.
  • Understanding and experience with IP address space management subnetting name resolution.
  • Familiarity with key security models and regulations such as Mitre ATTACK NIST CSF SOX and PCI.
  • Ability to support both internal and external audits.
  • Experience in the areas of change control problem management incident management troubleshootingsecurity tools architecture and deployments
  • Ability to multi-task and work on multiple projects at one time.
  • Fortune 500 or large enterprise experience
  • Proficiency in investigative practices and procedures (forensics knowledge is a plus).

V. Work Environment Listed below are key points regarding environmental demands and work environment of the job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of the job.

Normal setting for this job is: office setting.

Benefits
At Waste Management each eligible employee receives a competitive total compensation package including Medical Dental Vision Life Insurance and Short Term Disability. As well as a Stock Purchase Plan Company match on 401K and more! Our employees also receive Paid Vacation Holidays and Personal Days. Please note that benefits may vary by site.

If this sounds like the opportunity that you have been looking for please click Apply.




Required Experience:

Senior IC

Employment Type

Full-Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.