Description
Position at The Pasha Group Information for California residents about our collection and use of job applicant personal information can be found here: Privacy Practices
Job Summary
The Cybersecurity Engineer implements, manages, and improves secure solutions to safeguard the organization's information systems at our offices, data centers, vessels, and port facilities. The role develops and implements advanced threat detection capabilities, is on the forefront of incident response, and continuously evolves cybersecurity tools to mitigate, prevent, and detect new attacks.
Primary Objectives
• Coordinate and conduct security assessments, threat analysis, and compliance activities for enterprise, vessels, and port security, while staying updated on cybersecurity trends, collaborating with IT and other departments, and educating employees on best practices.
• Facilitate the incident response process in detecting anomalies, managing threats from detection to recovery, improving processes, investigating incidents, conducting exercises, and updating response plans and procedures across all business units.
• Optimize and operate cybersecurity tools and processes to enhance threat detection and response capabilities, ensure system integrity, and continuously improve security measures across various log sources and endpoints.
• Advance and sustain comprehensive security across Windows, Azure, and Microsoft 365 by protecting operating systems, managing patches, mitigating vulnerabilities, hardening images, enforcing policies, safeguarding sensitive information, auditing Azure Conditional Access rules, and improving the Microsoft Defender portal security score. Duties and Responsibilities
• Coordinate and conduct Third Party Pen Tests of various systems, applications, sites, and vessels in accordance with regulatory and contractual requirements.
• Conduct thorough threat analysis and assessments to identify potential security risks.
• Work with Third Party Assessment Organizations (3PAOs) on compliance packages for ISO, NIST, CMMC, and other frameworks as required.
• Maintain and apply current knowledge of emerging threats, attack vectors, and cybersecurity trends to proactively protect the organization.
• Conduct regular assessments, drills, and exercises with our vessels and Maritime Transportation Security Act (MTSA) regulated faculties to identify gaps and areas for improvement.
• Work closely with IT and other departments in collaborative initiatives to improve security.
• Document, record, and report on cyber threat intelligence from law enforcement, the US government, and commercial sources.
• Influence and mentor technical teams, encouraging a security-first culture across the organization.
• Provide, implement, and update training and awareness programs to educate employees on cybersecurity best practices across the enterprise and the fleet.
• Facilitate incident response processes in detecting anomalies and processing alerts through the pipeline to resolution.
• Continuously improve incident response processes throughout the organization.
• Thoroughly investigate and document incidents incorporating lessons learned.
• Conduct Incident Response Tabletop Exercises in accordance with the Enterprise Incident Response Plan.
• Work cross-functionally to maintain and update Incident Response Plans, Policies, and Procedures.
• Fine-tune cybersecurity tools (SIEM, EDR, IDS/IPS) to maximize threat visibility and detection capabilities.
• Participate in end-to-end threat management processes, from initial detection and analysis to containment, eradication, and recovery.
• Regularly assess the effectiveness of detection mechanisms and make necessary adjustments to improve accuracy and coverage.
• Regularly review and fine-tune the configurations of current cybersecurity tools such as SIEM, EDR, and IDS/IPS to ensure they are effectively detecting and alerting on potential threats.
• Work with various log sources and data feeds to enhance the visibility and detection capabilities of the team. This includes integrating logs from network devices, servers, applications, and cloud environments.
• Perform daily security monitoring to ensure the integrity and availability of hardware, server resources, systems, and key processes, including real-time analysis of logs, and proactive identification of potential threats.
• Administer the security of endpoints by leveraging and improving EDR solutions like Microsoft Defender for Endpoint (MDE).
• Improve the protection of Windows operating systems, both servers and workstations across the organization, including onboard the vessels.
• Apply patch management processes that includes installing, testing, and monitoring patches on servers, workstations, and laptops while continuously assessing and improving the process to ensure long-term security and compliance.
• Advance comprehensive enterprise vulnerability management program, ensuring continuous improvement, proactive identification, and mitigation of vulnerabilities.
• Cross functionally create and harden images for enterprise and vessel based physical and virtual workstations and server operating systems.
• Effectively enforce security policies across the enterprise by leveraging tools such as Group Policy Objects (GPO) and Microsoft Intune, ensuring consistent application of security settings, compliance with regulatory standards, and protection of all devices and systems.
• Administer Privileged Access Management (PAM) tools to safeguard sensitive information and secrets, ensuring secure access controls and monitoring privileged accounts.
• Regularly audit, monitor, and update Azure Conditional Access rules to protect sign-ins and enforce multi-factor authentication (MFA).
• Improve the security score in the Microsoft Defender portal by regularly assessing and addressing vulnerabilities, implementing recommended security measures, and continuously monitoring for threats.
• Other duties as assigned. QUALIFICATIONS
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Education
• Bachelor's / Master' degree in Information Sciences, Information Systems, Cybersecurity, Network Engineering, IT Infrastructure or related field or equivalent combination of coursework and experience in a directly related field required Licenses and Certifications
• Transportation Worker Identification Credential (TWIC) required
• (ISC)2, GIAC, ISACA, CompTIA, or similar certifications preferred Work Experience
• 5+ years of experience in cybersecurity or related role with strong knowledge of advanced cybersecurity principles and best practices required
• 10+ years of experience in one or more of the following areas: cloud management, system deployments, networking, or a similar role, with a proven track record of independent problem solving in high-stakes environments required Required Knowledge, Skills and Abilities
• Demonstrated knowledge of firewalls, log analysis, SIEM systems, and network traffic analysis.
• Applied ability to perform incident response, including investigation, forensic analysis, incident timeline reconstruction, and resolution of security incidents.
• Demonstrated understanding of concepts, best practice, and standards of network security, incident response, intrusion detection, forensics, vulnerability assessments, threat hunting, penetration testing, cyber threat intelligence, or similar cyber security role.
• Ability to collect, parse, and analyze log data from a variety of systems (e.g., servers, network devices, user sessions) to detect potential security incidents.
• Ability to lead projects and teams including leading the implementation or administration of systems.
• Knowledge of common security vulnerabilities and mitigations, attacker TTPs (tactics, techniques, and procedures) and associated detection methods, familiarity with one or more cybersecurity frameworks, and a solid understanding of core cybersecurity principles.
• Knowledge of network security and upper layer protocols.
• Demonstrated ability to work well independently as well as collaboratively in an interdisciplinary team.
• Ability to work on multiple tasks and respond to rapidly changing priorities.
• Excellent verbal and written communication skills. Competencies
• Delivers Results Rigorously drives self and others to achieve high levels of individual and organization performance.
• Engages & Inspires Others Leads with energy, self-confidence and understanding in ways that motivate colleagues to achieve more than they thought possible.
• Focuses on the Customer & Market Continuously evaluates what is important to the customer/client and develops products or solutions that exceed expectations.
• Makes Sound Business Decisions Makes timely and well-informed decisions that advance critical priorities, capitalize on new opportunities, and resolve problems.
• Practices our Values Supports and models The Pasha Way; conduct reflects Excellence, Honesty, Integrity, Innovation and Teamwork. PHYSICAL DEMANDS, WORK ENVIRONMENT . click apply for full job details
Date Posted: 09 May 2025
Apply for this Job