Sr. Cybersecurity Engineer

1 Month ago • 5 Years + • Cyber Security

About the job

Summary

Fluence seeks a Sr. Cybersecurity Engineer with 5+ years of experience in securing applications, networks, servers, and cloud environments. Must have strong understanding of OSI/TCP/IP, secure design principles, and defense-in-depth strategies. Proven ability to work independently and collaborate with cross-functional teams is essential.
Must have:
  • Cybersecurity Experience
  • Secure Design
  • Defense-in-Depth
  • OSI/TCP/IP
Good to have:
  • SDLC Integration
  • Threat Modeling
  • Incident Response
  • Security Awareness
Perks:
  • Hybrid Work
  • Global Team
Not hearing back from companies?
Unlock the secrets to a successful job application and accelerate your journey to your next opportunity.
The Sr Cybersecurity Engineer will perform as a member of a dynamic product team ensuring the security of Fluence products. The Sr Cybersecurity engineer must have an analytical mind and a detailed understanding of secure design, defense in depth strategies, operations, & security best practices. Sr Cybersecurity engineers are expected to have meticulous attention to detail, outstanding problem-solving and documentation skills, work comfortably under pressure, and deliver on tight deadlines.

What does a Sr. Cybersecurity Engineer do at Fluence?

    • Participating in an agile team and tracking day to day activities in Jira.
    • Evaluating and implementing new and state-of-the-art technology to address challenging customer problems. Participate in network and security design reviews.
    • Ensuring network security and communicating security vulnerabilities of all severities to affected stakeholders within the product organization.
    • Planning, implementing, managing, monitoring, and upgrading security measures for the protection of the organization's data, systems, and networks.
    • Troubleshooting and debugging production environments and providing support to a global organization.
    • Identifying opportunities to improve workflow and creating/maintaining supporting documentation.

What does the ideal candidate look like?

    • Minimum of 5+ years of experience in cybersecurity roles.
    • The preferred candidate will have a background B.S. degree in Information Technology, Information Security, Cybersecurity, Networking, Computer Science, or related technical field.
    • Solid understanding of OSI layer and TCP/IP models, defense in depth strategies, and applying secure design principles in securing applications, networks, servers and cloud environments.
    • Ability to work independently with little day to day guidance to achieve targets and goals.
    • SDLC Security Integration: Collaborate with cross-functional teams to integrate security measures and best practices into the Software Development Life Cycle (SDLC).
    • Product Security Assurance: Conduct comprehensive security assessments and audits, vulnerability assessment, testing, and code reviews for software components utilized in our Industrial Control Systems. Identify potential vulnerabilities and design flaws and provide recommendations for remediation and mitigation.
    • Secure Code Development: Assist software development teams in adopting secure coding practices, including adherence to coding standards and best practices.
    • Threat Modeling: Perform threat modeling exercises to identify potential attack vectors and security weaknesses in software components. Work proactively to address these threats during the development process.
    • Incident Response: Collaborate with the Incident Response team to investigate and respond to any security incidents related to ICS software components. Provide technical expertise to support incident analysis and recovery efforts.
    • Security Awareness Training: Conduct training sessions to raise awareness among OT and development teams about potential cyber threats and best practices in ICS security.
    • Regulatory Compliance: Stay updated on relevant industry regulations and standards (e.g., NERC CIP, IEC 62443) to ensure compliance and alignment with best practices.
    • Risk Assessment: Assist in conducting risk assessments of software components, development, production and ICS environments, identifying and prioritizing potential security risks.
    • Documentation: Create and maintain technical documentation related to security assessments, vulnerability findings, and recommended remediation measures, SOPs, work instructions and procedures.
    • Continuous Improvement: Actively participate in the continuous improvement of security processes, methodologies, and tools used in the OT cyber security program.
    • Relevant certifications: Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), CompTIA Security+, Certified Ethical Hacker (CEH) etc. 
    • Excellent communication and interpersonal skills.
undefined
View Full Job Description

About The Company

South Australia, Australia (On-Site)

South Australia, Australia (On-Site)

North Holland, Netherlands (Hybrid)

Berlin, Germany (On-Site)

Bavaria, Germany (On-Site)

View All Jobs

Level Up Your Career in Game Development!

Transform Your Passion into Profession with Our Comprehensive Courses for Aspiring Game Developers.

Job Common Plug