- Company Name
- Blue Chip Talent
- Job Title
- Security Engineer #25322
- Job Description
-
**Job Title:** Security Engineer
**Role Summary:**
Responsible for managing and continuously improving application security tooling (DAST, SAST, SCA) and Azure security controls. Embeds security testing into CI/CD pipelines, prioritizes vulnerability remediation, maintains Azure compliance, monitors threat intelligence, and enforces IAM least‑privilege principles.
**Expectations:**
- 3–5 years of cybersecurity operations or a related discipline.
- Proven experience with Microsoft Azure security suite (Defender for Cloud, Entra ID, Sentinel).
- Strong background in DAST, SAST, and SCA tools.
- Ability to lead proactive vulnerability assessments and remediation.
- Familiarity with ISO standards or equivalent security frameworks.
- Collaborative, detail‑oriented, and proactive mindset.
**Key Responsibilities:**
- Oversee day‑to‑day operation and improvement of DAST, SAST, and SCA tools.
- Integrate security testing into CI/CD pipelines and manage vulnerability triage, tracking, and resolution.
- Analyze scan results to prioritize application‑layer security risks.
- Assess, harden, and maintain Azure IaaS, PaaS, and networking configurations per best practices.
- Monitor cloud and hybrid environments for misconfigurations and threats.
- Apply security controls, updates, and patches recommended by Defender for Cloud.
- Conduct vulnerability assessments and coordinate remediation actions.
- Leverage threat intelligence to strengthen defenses.
- Support secure application development, deployment, and compliance processes.
- Oversee IAM implementation, enforcing least‑privilege access.
**Required Skills:**
- Cybersecurity operations experience (3‑5 years).
- Expertise in Microsoft Azure security tools (Defender for Cloud, Entra ID, Sentinel).
- Proficiency with DAST, SAST, and SCA.
- Leadership in vulnerability assessment and remediation workflows.
- Knowledge of ISO or equivalent security frameworks.
- Experience integrating security controls into CI/CD pipelines.
- Ability to interpret and apply threat intelligence.
- Strong understanding of IAM best practices and least‑privilege enforcement.
**Required Education & Certifications:**
- Bachelor’s degree in Computer Science, Information Security, or related field (preferred).
- Certifications (preferred): CISSP, CISM, AZ‑500, CySA+, CEH.