Cybersecurity Engineer
- Worked with teams to develop company-wide information assurance, security standards and procedures.
- Coordinated with third-party security information and event management (SIEM) providers to maintain protections and predict threats.
- Managed company Bring Your Own Device program, onboarding employee devices and verifying absence of inherent security threats.
- Implemented necessary controls and procedures to protect information system assets from intentional or inadvertent modification, disclosure or destruction.
- Sustained optimal sender score on two IPs, enhancing inbox delivery and corresponding metrics while improving delivery metrics from [Number]% to [Number]%.
- Developed and maintained company-wide endpoint security solutions.
- Coordinated security initiatives with personnel at [Type] and [Type] sites across [Location].
- Maintained strict adherence to regulations such as payment card industry (PCI) data security standard.
- Created standardized incident response program to outline immediate and consistent remediation of security breaches.
- Applied Center for Internet Security (CIS) benchmarks to verify performance of ongoing security measures.
- Designed standardized incident logging system to track historical incursions while helping prevent future breaches.
- Selected appropriate intrusion detection system solutions for implementation at facilities.
- Authored security and vulnerability reports, detailing logged incursions and suggesting remediation efforts.
- Installed and maintained commercial firewall solution, working with security vendors to consistently apply best practices and software updates.
- Offered preventive training to harden personnel against intrusion vectors such as phishing, ransomware and more.
- Designed, installed and configured email encryption gateways with data loss prevention.
- Developed security metrics and technical analysis to give insight into performance and trends.
- Created frameworks by designing and developing technical solutions.
- Translated strategy into solutions and operating models by leading or managing others,
- Traveled to client sites to perform onsite testing.
- Engaged business and technology stakeholders to gather goals and requirements.
- Liaised with third parties to respond to security events and understand threat landscape.
- Created policies and procedures for emerging security technologies and proposals.
- Worked with business partners to balance requirements, security and risk reduction.