Cybersecurity Operations Engineer

Job Type: Contract
Work Flexibility: Remote
Location: Oakland CA
Required Skills: Akamai Axonius CrowdStrike Fortinet Tenable Vectra

Role: Cybersecurity Operations Engineer
Location: Oakland, CA (Remote)
Duration: 6+ months
Pay Rate: $50 to $55
 
 

Overview: We are seeking a mid-to-senior level Cybersecurity Operations Engineer to take ownership of core security operations and engineering functions across firewalls, email security gateway, endpoint detection/response (EDR), threat & vulnerability management (TVM) tools, cloud security (Azure), and penetration testing coordination. This is a hands-on role focused on maintaining stability, reducing risk, and continuously improving detection, response, and hardening across the environment.

 

Key Experience Requirements:

  • Network Security / Firewalls: Strong hands-on experience with firewall policy administration, rule lifecycle management, troubleshooting, and change control (Fortinet preferred).
  • Email Security Gateway: Administration and tuning of email security controls (Mimecast preferred), including policy maintenance and investigation workflows.
  • Threat & Vulnerability Management (TVM): Proficiency with Tenable.io/Tenable.sc for production scan deployments, tuning, coverage management, and reporting.
  • EDR / Endpoint Security: Experience with CrowdStrike Falcon operations—alert triage, investigation, response actions, and tuning for low-noise/high-signal outcomes.
  • Cloud Security (Azure): Experience with Azure security controls, monitoring, and secure configuration practices (e.g., identity, logging, network controls, posture management).
  • Pen Testing: Experience coordinating internal/external penetration tests, tracking remediation, and validating fixes/closures.

 

Responsibilities:

  • Provide Tier 2/3 support for firewall policy administration, change control, and troubleshooting; optimize rulesets and ensure continued stability and secure configurations.
  • Maintain and tune email security policies (anti-phishing, impersonation protection, URL/file controls); support investigations and ongoing stability of the email security platform.
  • Manage Tenable scanning from validation to full production; ensure scan coverage, credentialed scanning where applicable, tuning to reduce noise, and actionable reporting for remediation teams.
  • Monitor and manage CrowdStrike detections; perform triage and investigations, execute response actions, and maintain a low-noise, automation-friendly detection environment.
  • Support Azure security monitoring and hardening initiatives, including secure configurations, identity and access best practices, logging/telemetry validation, and remediation tracking.
  • Coordinate penetration testing activities, ensure findings are tracked to closure, validate remediations, and maintain evidence of pass/fail outcomes.
  • Create and maintain runbooks/playbooks for common investigations, changes, and recurring operational tasks; improve repeatability and reliability.
  • Provide limited support for GRC reporting or control evidence coordination (Hyperproof) as requested.

 

Technical Requirements:

  • 5+ years (or equivalent) hands-on experience in security operations/engineering.
  • Fortinet firewall administration experience (or comparable enterprise firewall platforms).
  • Mimecast (or comparable email security gateway) administration and policy tuning experience.
  • io/Tenable.sc experience in production deployments and reporting.
  • CrowdStrike Falcon experience (triage, investigations, response, tuning).
  • Working knowledge of Azure security services and cloud hardening practices.
  • Strong incident triage skills, documentation habits, and cross-team coordination.

Apply for this position

Allowed Type(s): .pdf, .doc, .docx