Senior Cybersecurity Engineer
Costa Rica
CSC Generation
What you get to do every day:
- Design and implement a secure architecture for systems and applications.
- Evaluate and recommend security solutions to enhance the overall security posture. 2. Security Infrastructure Management:
- Implement and manage security tools, such as firewalls, intrusion detection/prevention systems, and antivirus solutions.
- Maintain and update security policies, procedures, and documentation.
- Collaborate with IT teams to ensure security is integrated into system and network designs. 3. Vulnerability Assessment and Penetration Testing:
- Conduct regular vulnerability assessments to identify and remediate potential security risks.
- Perform penetration testing to simulate cyber-attacks and identify vulnerabilities that could be exploited. 4. Cloud Security:
- Ensure the security of cloud-based infrastructure and services.
- Implement and monitor security controls in cloud environments (e.g., AWS, Azure, Google Cloud). 5. Security Automation:
- Develop and implement automation scripts and processes to streamline security tasks.
- Integrate security into the continuous integration/continuous deployment (CI/CD) pipeline. 6. Research and Development:
- Stay current with industry trends, emerging technologies, and best practices in cybersecurity.
- Evaluate and recommend new security tools and technologies. 7. Risk Management:
- Conduct risk assessments and implement risk mitigation strategies.
- Provide guidance on risk management to business units and project teams. 8. Collaboration and Communication:
- Collaborate with cross-functional teams, including IT, development, and operations, to integrate security into all aspects of the organization.
- Communicate effectively with stakeholders to convey security risks and mitigation strategies.
What you bring to the role:
- Education: Bachelor’s degree in Cybersecurity, Information Technology, or a related field.
- Certifications:
- Relevant industry certifications (e.g., CISSP, CompTIA Security+, CEH) are preferred.
- GCP or AWS security certifications are a plus.
- Experience:
- Proven experience in managing website and web application security, including Web Application Firewalls (WAF), browser-based security (CSP, HSTS, XFO), OWASP Top 10, and related technologies.
- Proven experience in cybersecurity roles, including incident response, vulnerability management, and security infrastructure management.
- Knowledge: In-depth knowledge of networking protocols, security architectures, and common cyber threats.
- Preferred Experience: Experience working for e-commerce companies is desired.
- Non-Technical Competencies:
- Evangelist for security best practices.
- Ability to translate technical issues into business language for end-users.
- Team Player with proven communication, organizational, and strong interpersonal skills.
- Self-motivated out-of-the-box problem solver with the ability to switch between team projects and self-directed work.
- Able to prioritize and drive to results.
What our interview process looks like:
- Depending on the position, our application and interview process may vary, but here are some of the ways we get to know you better:
- 📞 Step 1: Match most of the requirements and qualifications for the position? We want to chat. A recruiter will reach out to you via email to schedule some time to learn more about our company and get to know you better. Remember, you’re also interviewing us!
- 📝 Step 2: Our assessments (if applicable to the role) measure your analytical and business acumen. We use them to better understand your expertise. Each person interviewing for the same role receives the same assessment, which helps us evaluate candidates equally and consistently.
- 👩🏽💻Step 3: Virtual or in-person interviews depending on your location. Our hiring team will learn more about your prior experience and challenges you’ve faced. Be prepared with detailed examples. Concise and well-organized answers are ideal.
- ✍🏽 Step 4: Offer! This is where things get really exciting. We gather all data from your interviews and conduct a final review. If qualified for the position, your recruiter will connect with you via phone to present a verbal offer we know you’ll be excited about.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Antivirus Application security Automation AWS Azure CEH CI/CD CISSP Cloud CompTIA E-commerce Firewalls GCP Incident response Intrusion detection OWASP Pentesting Risk assessment Risk management Vulnerabilities Vulnerability management
Perks/benefits: Career development
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.