Senior Cybersecurity Engineer

Seattle, Washington, United States

Apply now Apply later

Salary range is $100k to $195k, with a midpoint of $145k.  New hires typically receive between minimum and midpoint, however, we may go slightly higher based on experience, internal equity and market.

Sound Transit also offers a competitive benefits package with a wide range of offerings, including:

  • Health Benefits: We offer two choices of medical plans, a dental plan, and a vision plan all at no cost for employee coverage; comprehensive benefits for employees and eligible dependents, including a spouse or domestic partner.
  • Long-Term Disability and Life Insurance.
  • Employee Assistance Program.
  • Retirement Plans: 401a – 10% of employee contribution with a 12% match by Sound Transit; 457b – up to IRS maximum (employee only contribution).
  • Paid Time Off: Employees accrue 25 days of paid time off annually with increases at four, eight and twelve years of service. Employees at the director level and up accrue additional days. We also observe 12 paid holidays and provide up to 2 paid floating holidays and up to 2 paid volunteer days per year.
  • Parental Leave: 12 weeks of parental leave for new parents.
  • Pet Insurance.
  • ORCA Card: All full-time employees will receive an ORCA card at no cost.
  • Tuition Reimbursement: Sound Transit will pay up to $5,000 annually for approved tuition expenses.
  • Inclusive Reproductive Health Support Services.
  • Compensation Practices: We offer competitive salaries based on market rates and internal equity. In addition to compensation and benefits, you’ll find that we provide work-life balance, opportunities for professional development and recognition from your colleagues.

GENERAL PURPOSE: 

Under general direction, the Senior Cybersecurity Engineer performs at a senior professional level supporting the operation of the technical controls outlined by the Agency’s Information Security Program for its corporate IT infrastructure; evaluates, designs, builds, and documents security solutions; evaluates proposed projects and activities to identify information security risks and available mitigating controls; evaluates systems for compliance with internal policies and standards, as well as applicable regulatory frameworks, recommending solutions to address any gaps; and acts as primary handler in the execution of the incident response plan for IT.

ESSENTIAL FUNCTIONS:

The following duties are a representative summary of the primary duties and responsibilities. Incumbent(s) may not be required to perform all duties listed and may be required to perform additional, position-specific duties.

  • Identifies and assesses technology-related risks to information security associated with current and prospective technology solutions; and recommends appropriate mitigating controls. 
  • Develops technical standards to interpret and implement applicable information security policies and controls; evaluates any prospective technology solution for adherence to documented agency standards, policies, and regulatory responsibilities. 
  • Collaborates with other IT engineering and administration disciplines to ensure security best practices are incorporated into design, implementation, and sustainment of systems and services within the enterprise. 
  • Assesses and classifies any identified system vulnerabilities in accordance with pre-defined risk criteria; advises and consults with internal customers on risk assessment, threat modeling, and mitigation of vulnerabilities. 
  • Develops Incident Response dashboard and metrics; leads information security incident investigation and response efforts; conducts computer and network forensic investigations in support of incident response activities; performs root-cause analysis when incidents occur and prepare incident reports. 
  • Evaluates, implements, and supports security-focused tools and services required to support information security controls. 
  • Assists in promoting a culture of information security at Sound Transit. 
  • Conducts regular security reviews of both software and processes. Reviews and creates threat models and recommends security enhancements consistent with information security strategy and evolving threats. 
  • Interacts with penetration testers and other external vendors as needed. 
  • Keeps up to date on latest information security trends, “best practices”, threats, and countermeasures. 
  • Reviews log-based data, both in raw form and utilizing SIEM or aggregation tools. 
  • Operates and maintains systems and applications used to support security controls and activities.
  • Champions and models Sound Transit's core values and demonstrates values-based behaviors in everyday interactions across the agency.
  • Contributes to a culture of diversity, equity and inclusion in alignment with Sound Transit’s Equity & Inclusion Policy.
  • It is the responsibility of all employees to follow the Agency safety rules, regulations, and procedures pertaining to their assigned duties and responsibilities, which could include systems, operations, and/or other employees.  
  • It is the responsibility of all employees to integrate sustainability into everyday business practices.
  • Other duties as assigned.

MINIMUM QUALIFICATIONS:

Education and Experience: Bachelor's degree in Computer Science, Information Technology or Business Management Information Systems and six years of information systems security (or cyber security) experience, or closely related field; OR an equivalent combination of education and experience.

Preferred Licenses or Certifications:

  • Certified Information Systems Security Professional (CISSP), or ability to obtain certification within 12 months of hiring.
  • CEH, CCFP, GCIH (or other GIAC), CCSP, or others that are considered field-relevant.

Required Knowledge and Skills:

  • Experience with the application of threat modeling or other risk identification techniques. 
  • Working understanding of Operating System architecture as it relates to the functions of the following components: OS kernel, OS kernel modules and device drivers, memory management, inter-process communication, security subsystem, user account rights, user group rights, system logs, I/O functions, network services, file-system permissions, and application interaction with the Operating System. 
  • Strong understanding of Microsoft OS (Server and Workstation) and Linux OS products. MacOS is strongly desirable.
  • Technical skills proficiency in the following areas: security information event management, network protocols (e.g. TCP/IP, UDP, IPSEC, HTTP, HTTPS, routing protocols), system administration, malware (propagation, infection, types), intermediate knowledge of network security controls and technologies (proxy, firewall, IDS/IPS, router/switch, open source information collection platforms), cryptography, Microsoft Active Directory and Microsoft cloud technologies (Azure, M365, Entra). 
  • Deep knowledge of security operations: perimeter defense, forensics, incident response, kill chain analysis, risk assessment, and security metrics. 
  • Strong understanding of internet-facing, web applications. 
  • Relevant experience and detailed technical knowledge in security engineering, system and network security, authentication and security protocols, and cryptography. 
  • Good knowledge of information security incident handling and investigation procedures. 
  • Demonstrated skills in conducting forensic analysis of digital evidence, network traffic, managing event analysis/correlation, and related incident investigations. 
  • In-depth knowledge of security software threats and vulnerability mitigation techniques. 
  • Strong understanding of cloud platforms (Azure, AWS). 
  • Working knowledge of risk-based methodologies and one or more of the following frameworks: ISO 27001/2:2022, PCI-DSS, or NIST 800-53. 
  • Ability to self-organize and manage workload and activities
  • Principles of business letter writing and basic report preparation. 
  • English usage, spelling, grammar, and punctuation. 
  • Modern office procedures, methods, and equipment including computers and computer applications such as word processing, spreadsheets, and statistical databases. 
  • Lead/supervisory principles, methods, and techniques.

Preferred Knowledge and Skills:

  • Establishing and maintaining effective working relationships with other department staff, management, vendors, and other stakeholders. 
  • Documenting and explaining risks, recommendations, and incident data to technical stakeholders. 
  • Interpreting and administering information security policies, standards, and procedures sufficiently to administer, discuss, resolve, and explain them to staff and other constituencies. 
  • Generating metrics and preparing reports to facilitate decision-making on security-related activities. 
  • Utilizing personal computer software programs affecting assigned work and in compiling and preparing spreadsheets and reports. 
  • Preparing and analyzing complex data and comprehensive reports. 
  • Writing of technical documentation and standards. 
  • Scripting skills (e.g., PowerShell).
  • Responding to inquiries and in effective oral and written communication. 
  • Researching, analyzing, and evaluating new security processes, products, and techniques. 
  • Candidate should have excellent time management skills including the ability to prepare, prioritize, and complete work plans. 
  • Ability to work effectively and organize priorities independently. 
  • Results oriented, highly organized, proactive, and self-motivated. 
  • Working effectively under pressure, meeting deadlines, and adjusting to changing priorities. 
  • Researching, analyzing, and evaluating new service delivery methods and techniques. 
  • Working cooperatively with other departments, agency officials, and outside agencies.

Physical Demands / Work Environment:  

  • Work is performed in a standard hybrid office and field environment.
  • Positions working in field may occasionally be exposed to dangerous machinery, extreme weather conditions, physical harm, hazardous chemicals, and/or extreme noise.
  • This position is responsible for working with computer equipment that may require lifting up to 25 pounds, reaching, hand eye coordination, and vision.
  • Position supports incident responses that may require nights, weekends, and on-call shifts.
  • The Agency promotes a safe and healthy work environment and provides appropriate safety and equipment training for all personnel as required. 

 

Sound Transit is an equal employment opportunity employer. No person is unlawfully excluded from employment action based on race, color, religion, national origin, sex (including gender identity, sexual orientation and pregnancy), age, genetic information, disability, veteran status or other protected class.

Apply now Apply later
  • Share this job via
  • 𝕏
  • or
Job stats:  0  0  0

Tags: Active Directory AWS Azure CCSP CEH CISSP Cloud Compliance Computer Science Cryptography Firewalls Forensics GCIH GIAC IDS Incident response IPS ISO 27001 IT infrastructure Linux MacOS Malware Network security NIST NIST 800-53 Open Source PowerShell Risk assessment Scripting Security strategy SIEM Strategy TCP/IP Vulnerabilities

Perks/benefits: Career development Competitive pay Equity / stock options Health care Insurance Medical leave Parental leave

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.