Description
Company Overview
Founded in 2014, MAC FACE began as a business development and marketing company and evolved in 2018 into a staffing corporation proudly serving both government and enterprise clients nationwide. Operating within the employment industry, we live by our motto, “Soaring Beyond the Limits,” delivering results with speed, precision, and professionalism. More than connecting candidates to opportunities, we provide lasting value and impact. As the industry evolves, we remain committed to innovation, integrity, and excellence—powering people, driving business, and making a difference.
__________________________________________________________________________________________________
Daily Duties / Responsibilities:
The Cybersecurity Engineer will play a key role in strengthening the state’s information security posture through effective identity and access management, automation, and enterprise-level protection strategies. This role will focus on the planning, development, implementation, and management of integrated security solutions that protect state systems, data, and infrastructure.
Key Responsibilities:
- Lead Identity and Access Management (IAM) initiatives to ensure proper implementation, configuration, and maintenance of Single Sign-On (SSO), Multi-Factor Authentication (MFA), Active Directory, and related enterprise applications.
- Develop and implement automation scripts and integrations using tools such as Python and Bash to streamline and enhance enterprise security and IT operations.
- Plan, design, and implement enterprise security solutions aligned with organizational goals, compliance requirements, and risk tolerance levels.
- Design, deploy, and manage countermeasures to known security threats, and develop proactive strategies to mitigate emerging risks to enterprise data, networks, and associated services.
- Validate and ensure consistent application of security controls and protective measures across enterprise systems, infrastructure, and business applications.
- Collaborate with IT and security teams to monitor, analyze, and respond to security incidents and vulnerabilities.
- Support continuous improvement in security automation, access control, and compliance validation processes.
- Provide technical input and recommendations for security policies, standards, and best practices that protect state data and technology services.
Required Skills:
- Minimum five (5) years of experience with Identity and Access Management (IAM), including access control, logging, and reporting systems.
- Minimum five (5) years of experience in automation development using scripting tools such as Python and Bash.
- Strong understanding of cybersecurity principles, awareness, and risk management practices.
- Minimum five (5) years of experience with Linux and Windows environments, including network security protocols, authentication, and authorization mechanisms.
- Minimum five (5) years of experience supporting large-scale IT environments or enterprise system deployments.
Preferred Skills:
- Experience with Security Information and Event Management (SIEM) tools, including analysis and reporting.
- Working knowledge of security frameworks and compliance standards, such as NIST, CSF, CJIS, IRS 1075, and CMS MARS-E.
- Experience in Application Security (AppSec), including vulnerability scanning and secure coding practices.
Required Education / Certifications:
- Bachelor’s degree in Information Technology, Information Security, Computer Science, or a related field.
- In lieu of a degree, eight (8) years of relevant work experience may be substituted.
Preferred Education / Certifications:
- Advanced security certifications such as CISSP, CISA, or CISO (or equivalent).
- Additional relevant certifications, including CEH, OSCP, or GPEN.
- Vendor-specific certifications in SIEM, logging, or security technologies.
Interview Process:
- Initial Interview: Conducted via Microsoft Teams (camera on).
- Final Interview: In-person interviews preferred before final candidate selection.
- Scheduling: Interviews will be scheduled as soon as possible after posting closure and review of submitted resumes.