SonicJobs Logo
Left arrow iconBack to search

Senior Cyber Security Engineer I

Stratus
Posted 2 months ago, valid for 15 days
Location

Irving, TX 75059, US

Salary

Competitive

Contract type

Full Time

By applying, a Sonicjobs account will be created for you. Sonicjobs's Privacy Policy and Terms & Conditions will apply.

SonicJobs' Terms & Conditions and Privacy Policy also apply.

Sonic Summary

info
  • The Senior Cybersecurity Engineer I position is located at the Corporate Headquarters in Irving, TX, and requires a minimum of six years of experience in IT infrastructure, cybersecurity, or related technical roles.
  • Candidates should have at least three years of experience in information security, with a focus on cloud environments, and hands-on experience with major cloud providers like AWS, Azure, or GCP.
  • This role involves monitoring and responding to security events, assisting in incident investigations, and maintaining documentation to support SOC processes.
  • The ideal candidate will possess a solid understanding of networking concepts, common cyber threats, and familiarity with security tools, along with strong analytical and communication skills.
  • Salary details are not provided in the job description.

Job DetailsJob Location: Corporate Headquarters - Irving, TX 75038The Senior Cybersecurity Engineer I is a security expert who addresses security events in both cloud and enterprise environments. They are responsible for monitoring, triaging, and responding to these events. This role is crucial to the Security Operations function, as it contributes to incident response, threat detection, and the implementation of security controls aligned with SOC 2. The ideal candidate should have extensive experience with fundamental security practices and a solid understanding of cloud security. They must be able to follow structured processes while making informed decisions during security investigations. This position requires close collaboration with senior engineers, IT Operations, and DevOps teams to ensure that security events are quickly identified, reported, and documented, all while continuously improving security measures and operational efficiency. Key Responsibilities: Security Monitoring & Alert Triage Monitor SIEM, EDR, and security dashboards for alerts and suspicious activity. Perform initial analysis and triage of security alerts based on established playbooks. Distinguish false positives from legitimate security events and escalate when required. Incident Support Assist senior analysts during security incident investigations. Collect logs, evidence, and basic indicators of compromise (IOCs). Document incidents accurately in ticketing and case management systems. Threat Awareness & Analysis Identify common attack techniques such as phishing, malware, brute force, and credential misuse. Use basic threat intelligence sources to support alert validation. Follow MITRE ATT&CK–aligned detection and response procedures. Operational Support Maintain accurate records and incident documentation. Follow SOC processes, runbooks, and escalation procedures. Learning & Development Continuously develop cybersecurity skills through hands-on experience and training. Stay current on emerging threats and security best practices. Education & Experience Bachelor’s degree in Information Technology, Cybersecurity, Computer Science, or a related field. Minimum of six (6) years of experience in IT infrastructure, cybersecurity, or related technical roles. Demonstrated experience supporting or implementing SOC 2 compliance controls in a cloud-based environment. Prior experience working in or alongside a Security Operations Center (SOC) or equivalent security function. QualificationsRequired Qualifications 3+ years of experience in information security, with at least 2 years focused on cloud environments. Hands-on experience with at least one major cloud provider: AWS, Azure, or GCP. Solid understanding of: Networking concepts (TCP/IP, DNS, HTTP/S) Operating systems (Windows and Linux fundamentals) Common cyber threats, attack vectors, and defensive techniques Familiarity with security tools such as: SIEM platforms Endpoint Detection & Response (EDR/XDR) Log analysis and monitoring tools (Academic, lab, or professional experience acceptable) Strong attention to detail with the ability to follow structured procedures and playbooks. Clear written and verbal communication skills. Preferred / Nice-to-Have Skill: Certifications: AWS Certified Security Specialty, Azure Security Engineer Associate, Google Professional Cloud Security Engineer, CCSP, CISSP. Experience with containers, Kubernetes security, and service mesh (e.g., Istio). Knowledge of DevSecOps practices and CI/CD pipeline security. Experience with third-party security tools (e.g., Rapid7, Zscaler, CrowdStrike, Palo Alto Prisma). Soft Skills: Strong analytical and problem-solving skills. Ability to communicate technical risks to non-technical stakeholders. Collaborative mindset and ability to work across IT, DevOps, and business units. Detail-oriented with a proactive approach to risk mitigation. Physical Requirements: Ability to sit for extended periods of time. Repetitive movement of fingers and hands Talking and hearing Reaching with hands and arms Clarity of vision at 20 feet or less   Mental Requirements: Read, evaluate and interpret data. Performing Data entry mathematical operations   Work Environment: Standard office environment   Hazards: None




Learn more about this Employer on their Career Site

Apply now in a few quick clicks

By applying, a Sonicjobs account will be created for you. Sonicjobs's Privacy Policy and Terms & Conditions will apply.

SonicJobs' Terms & Conditions and Privacy Policy also apply.