Job added in hotlist
Applied job
Contract job
90-day-old-job
part-time-job
Recruiter job
Employer job
Expanded search
Apply online not available
View more jobs in Detroit, MI
View more jobs in Michigan

Job Details

Cyber Security Engineer I

Company name
Detroit Tigers, Inc.

Location
Detroit, MI, United States

Employment Type
Full-Time

Industry
Engineering, It

Posted on
Nov 07, 2020

Apply for this job






Profile

:text,ActualValueFromSolar:null},{QuestionName:Job Description,AnswerValue:\u003cfont style=\font-size: 14px;\\u003e\u003cstrong\u003e\u003cfont style=\font-family: calibri,sans-serif; size: undefined;\\u003eJob Summary:\u003c/font\u003e\u003c/strong\u003e\u003c/font\u003e\u003cbr\u003e\u0026nbsp;\u003cbr\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eThe Cyber Security Engineer I \u003c/font\u003e\u003c/span\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003ewill provide hands-on technical security engineering support for software/hardware/network systems. Apply system security and cybersecurity engineering principles to difficult engineering issues and provide realistic and implementable configuration management solutions designed to enhance the LCE security posture.\u0026nbsp; This positon must be able to work on the development of security systems as well as defeating new and advanced security techniques.\u0026nbsp; This position will interface with all levels of the organization and have access to security-sensitive information.\u003c/font\u003e\u003c/span\u003e\u003cbr\u003e\u0026nbsp;\u003cbr\u003e\u003cstrong\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eEssential Job Functions:\u003c/font\u003e\u003c/span\u003e\u003c/strong\u003e\u003cbr\u003e\u0026nbsp;\u003col dir=\ltr\\u003e\u003cli style=\margin-top: 0in; margin-right: 0in; margin-bottom: 12pt;\\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eBuild Information Technology devices with Microsoft and open source operating systems \u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-bottom: 12pt;\\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eInfrastructure design with a focus on implementing new technologies within LCE compliance\u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-bottom: 12pt;\\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eApply networking techniques to determine issues that may complicate the performance of vulnerability scans and new security techniques.\u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-bottom: 12pt;\\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eAdvise internal client on cybersecurity and it \u003c/font\u003e\u003c/span\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eaffects implementation of new tools like cloud technology.\u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-bottom: 12pt;\\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eComplete \u003c/font\u003e\u003c/span\u003e\u003cfont style=\font-size: 10pt;\\u003estraightforward \u003cspan style=\color: rgb(51, 51, 51);\\u003edocumentation focused on briefings, certification \u0026amp; accreditation\u003c/span\u003e\u003c/font\u003e\u003c/li\u003e\u003cli style=\margin-bottom: 12pt;\\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eEvaluate requests to back off security settings and weigh the impact of security versus operational requirements to make an educated decision and recommendation to LCE \u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-bottom: 12pt;\\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eOversee vulnerability remediation efforts\u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-bottom: 0pt;\\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eMaintain Risk Management Framework accreditation packages \u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003c/ol\u003e\u0026nbsp;\u003cbr\u003e\u003cstrong\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eMinimum Skills, Knowledge and Abilities:\u003c/font\u003e\u003c/span\u003e\u003c/strong\u003e\u003col dir=\ltr\\u003e\u003cli\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eBachelors’ degree in Systems Engineering, Computer Engineering, Computer Science, or other closely related discipline.\u0026nbsp; Equivalent experience may be considered in lieu of formal degree.\u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eMinimum of six (6) years’ experience with hands-on experience in uncomplicated systems engineering to include basic network, storage, back-up, platforms, middleware, application, monitoring and security.\u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eMinimum of four (4) years’ experience in security functions, including engineering design, security configuration, implementation, operations, and maintenance of a variety of basic security technologies used for the following security defense areas that include: network, storage/back, platforms (Windows/Linux Servers and desktops), and web and email applications.\u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eMinimum of two (2) years’ experience with risk assessments and the ability to prioritize threat intelligence mitigation with security countermeasures with experience in patch management with a focus on utilizing SCCM and DISA tools like Vulnerability Management System (VMS) or similar tools.\u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eDemonstrated ability to maintain Risk Management Framework accreditation packages.\u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eEvidence of ability to hand cyber incident responses, management responsibilities, cyber risk and strategic analysis responsibilities.\u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003ePrior experience with vulnerability detection and assessment functions as well as digital forensics investigation and penetration testing.\u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eKnowledge of network and system engineering with knowledge and experience with troubleshooting techniques to determine network issues that may complicate performance (i.e. vulnerability scans).\u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eDemonstrated ability to prioritize and execute tasks in a high-pressure environment.\u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003cli\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eRequires self-motivated approach to work with keen attention to detail.\u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-top: 0in; margin-right: 0in; margin-bottom: 0pt;\\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eEvidence of ability to work in a team-oriented, collaborative environment with minimal oversight.\u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003c/ol\u003e\u0026nbsp;\u003cbr\u003e\u003cstrong\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003ePreferred Minimum Skills, Knowledge and Abilities:\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp;\u0026nbsp; \u003c/font\u003e\u003c/span\u003e\u003c/strong\u003e\u003cbr\u003e\u0026nbsp;\u003col dir=\ltr\\u003e\u003cli style=\margin-top: 0in; margin-right: 0in; margin-bottom: 0pt;\\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eDemonstrated experience as an ISSO/ISSE Cyber Security professional and know how cyber security affects the implementation of new tools.\u003c/font\u003e\u003c/span\u003e\u003c/li\u003e\u003c/ol\u003e\u0026nbsp;\u003cbr\u003e\u003cstrong\u003e\u003cspan style=\color: rgb(51, 51, 51);\\u003e\u003cfont style=\font-size: 10pt;\\u003eWork Environment:\u003c/font\u003e\u003c/span\u003e\u003c/strong\u003e\u003cbr\u003e\u0026nbsp;\u003col dir=\ltr\\u003e\u003cli style=\margin-top: 0in; margin-right: 0in; margin-bottom: 0pt;\\u003e\u003cfont style=\font-size: 10pt;\\u003eWorks in a normal office environment where there is no physical discomfort due to temperature, noise, \u003cfont style=\font-size: 13px;\\u003edust and the like. \u003c/font\u003e\u003c/font\u003e\u003c/li\u003e\u003cli style=\margin-top: 0in; margin-right: 0in; margin-bottom: 6pt;\\u003e\u003cfont style=\font-size: 13px;\\u003eWhile performing the duties of this job, the employee is regularly required to talk or hear. The employee is frequently required to sit and respond to phone inquiries for help.\u003c/font\u003e\u003c/li\u003e\u003cli style=\margin-top: 0in; margin-right: 0in; margin-bottom: 6pt;\\u003e\u003cfont style=\font-size: 13px;\\u003e\u003cfont style=\font-family: calibri,sans-serif; size: undefined;\\u003eRequires ability to work various work schedules that support a 24 X 7 operations which can include nights, weekends and holidays.\u003c/font\u003e\u003c/font\u003e\u003c/li\u003e\u003c/ol\u003e,VerityZone:jobdescription,QuestionType:textarea,ActualValueFromSolar:null},{QuestionName:Req Number,AnswerValue:4818BR,VerityZone:autoreq,QuestionType:text,ActualValueFromSolar:null},{QuestionName:City,AnswerValue:Detroit,VerityZone:formtext6,QuestionType:text,ActualValueFromSolar:null},{QuestionName:Position Type,AnswerValue:FTRG,VerityZone:formtext4,QuestionType:single-select,ActualValueFromSolar:null},{QuestionName:Functional Area,AnswerValue:Information Technology ,VerityZone:formtext5,QuestionType:single-select,ActualValueFromSolar:null},{QuestionName:State,AnswerValue:Michigan ,VerityZone:formtext2,QuestionType:single-select,ActualValueFromSolar:null},{QuestionName:Posted Job Title,AnswerValue:Cyber Security Engineer I,VerityZone:formtext7,QuestionType:text,ActualValueFromSolar:null},{QuestionName:Business Unit,AnswerValue:Little Caesars ,VerityZone:formtext3,QuestionType:single-select,ActualValueFromSolar:null}],GQId:2524,isGQResponsive:true,isActive:true,isSocialReferralJobRestricted:false,localeId:1033,AutoOptionalReqId:4818BR,Title:CYBER SECURITY ENGINEER I,JobSiteId:6894,Link:https://sjobs.brassring.com/TGnewUI/Search/home/HomeWithPreLoad?partnerid=26290\u0026siteid=6894\u0026PageType=JobDetails\u0026jobid=834935,isEverGreen:false},JobDetailFieldsToDisplay:{Position1:formtext3,JobTitle:formtext7,Position3:[formtext5,formtext6,formtext2],Summary:jobdescription,Section2Fields:[autoreq,jobtitle,formtext4,dateclosed]},BrandingConfiguration:{\brandingSettings\: {\Responsive_AdvancedCSS\: \\,\Responsive_BackgroundColor\: \#FFFFFF\,\Responsive_BackgroundImage\:
one\,\Responsive_BaseFontColor\: \#000000\,\Responsive_BaseFontFamily\: \\u0027Helvetica Neue\u0027, Helvetica, Arial, sans-serif\,\Responsive_BaseFontSize\: \16px\,\Responsive_ButtonBackgroundColor\: \#000000\,\Responsive_CompiledCSS\: \.baseFontColor { color: #000000;}.baseColorPalette { background-color: #ffffff; color: #000000;}.accentBkg { background-color: #e6e6e6; color: #000000;}.lightAccentBkg { background-color: #f0f0f0;}.veryLightAccentBkg { background-color: #f7f7f7;}.darkAccentBkg { background-color: #bfbfbf; color: #000000;}.gateway.themed .accentBkg .borderInAccentBkg { border-color: #bfbfbf;}.linkColorOnBkg { background-color: #ffffff; color: #363533; border-color: #363533; outline-color: #363533;}body,.ui-widget-content a,input { font-family: #SQ#Helvetica Neue#SQ#, Helvetica, Arial, sans-serif; font-size: 16px;}body,.pageHeader,button,.menu,.dialog .region,.dialog .body,.gateway .baseColorPalette,.ui-widget-content,.facet ul.liner { background-color: #ffffff; color: #000000;}.themed .pageHeader { background-color: #000000;}.themed .headerLink { color: #000000;}.themed.pageFooter { background-color: #000000;}.themed.pageFooter .footerLink,.themed.pageFooter .tgLocale { border-color: #E0E0E0; color: #ffffff;}.themed.pageFooter a { color: #ffffff; border-color: #ffffff;}.themed.pageFooter i { display: inline-block; color: #ffffff; border-color: #ffffff;}svg.styleableColor path,svg.styleableColor rect { fill: #000000; stroke: #000000;}a,a:visited,.link,.gateway.themed .linkColor,.jobtitle,.gateway .baseColorPalette a,.gateway .baseColorPalette a:visited,.facetFilterAccordion h3:after { color: #363533;}a.sidebarNav,.gateway .sidebarOverlay .sidebar { background-color: #ffffff;}.backLink { color: #363533;}.cue,.prompt,[disabled],::-webkit-input-placeholder,:-moz-placeholder,::-moz-placeholder,:-ms-input-placeholder { color: #737373;}.foreground { color: #000000; background-color: #ffffff;}.foreground span,.foreground a,.foreground a:visited { color: #000000;}.gateway.themed .controlWrapper span,.gateway.themed .controlWrapper a,.gateway.themed .controlWrapper a:visited { color: #000000;}.themed .hover,.menu a:hover { background-color: #f7f7f7;}.ui-state-hover { outline-color: #000000;}.striped :nth-child(even),.even,.ui-menu-item.ui-state-focus,.ui-datepicker .ui-state-default,.ui-widget-header { background-color: #f0f0f0;}.backgroundColor,.themed .down,.menu a:active,.menu a.active,.applyFlow .layoutsection .heading:before,.themed .ngdialog.ngdialog-theme-default .ngdialog-content { background-color: #ffffff;}.highlighted \u003e a,.gateway.themed .selectedTile { background-color: #e6e6e6; color: #000000;}.themed .primaryButton { background-color: #000000; color: #ffffff;}.themed .primaryButton:hover { background-color: #000000; color: #ffffff;}.themed .primaryButton:active { background-color: #000000; color: #ffffff;}.themed .primaryButton .ladda-label,.themed .primaryButton .button-label { outline-color: #ffffff;}.themed button,a.button { background-color: #030303; color: #ffffff;}.themed button:hover,a.button:hover { background-color: #0d0d0d; color: #ffffff;}.themed button:active,a.button:active { background-color: #1a1a1a; color: #ffffff;}.themed button .ladda-label,a.button .ladda-label,.themed button .button-label,a.button .button-label { outline-color: #ffffff;}.themed .closeButton,.themed .close { color: #000000;}.themed .closeButton:hover,.themed .close:hover { background: #cccccc;}.themed .closeButton:active,.themed .close:active { background: #e6e6e6;}.themed .clearButton { color: #000000;}.themed .progressBarContainer .progressBar .meter { background-color: #ffffff;}.pseudoradio.checked:after { background-color: #000000;}\,\Responsive_FooterBackgroundColor\: \#000000\,\Responsive_FooterLinkColor\: \#FFFFFF\,\Responsive_ForegroundColor\: \#ffffff\,\Responsive_HeaderBackgroundColor\: \#000000\,\Responsive_HeaderLinkColor\: \#000000\,\Responsive_LinkColor\: \#363533\,\Responsive_PrimaryHeaderLogo\: \https://mc.lcecorp.com/ATS/Ilitch_logo.png\,\Responsive_SecondaryHeaderLogo\:
one\}},FooterInfo:[{Name:Privacy Policy,Value:https://www.lceforum.com/lceforum/Portals/0/doc/Privacy_Policy.pdf,Icon:,onlyIcon:},{Name:Terms of Service,Value:https://www.lceforum.com/lceforum/Portals/0/doc/terms_of_service.pdf,Icon:,onlyIcon:}],EncryptedBruid:null,HashCode:0,LoggedIn:false,EncryptedSession:null,CompiledCss:true,IdForSocialLogin:34ef3b87-b6bf-419d-976e-c786233334c4,TotalCount:54,AllowAccessResponse:{Name:AllowAccess,Value:true},TalentSuiteClientName:null,ApplyStatus:null,ApplyDiff:10,NextApplyDate:null,LimitExceededMessage:null,JobId:834935,JobCartResponse:null,TGLocales:[{SiteId:6894,LocaleId:1033,LocaleName:English (United States),SiteLocaleName:English (United States),DefLangId:1},{SiteId:6897,LocaleId:3082,LocaleName:Español,SiteLocaleName:Spanish,DefLangId:27},{SiteId:6898,LocaleId:3084,LocaleName:Français (Canada),SiteLocaleName:French (Canada),DefLangId:141}],IsGTG:true,LocaleDesc:English (United States),ResponsiveCandidateZone:true,BasicProfileDetails:null,DashboardData:null,PendingAssessments:null,googlejobsMappingfielddataJson:,CustomWebTrackerResponse:[],Abc:0,SolarErrorOccurred:false} capture-escaped-parsed-value=preloadResponse />

Company info

Detroit Tigers, Inc.

Similar Jobs:
Lead SIEM Engineer(virtual remote)
Location : Dearborn, MI
Description Threat Management and Response supports Humana's value proposition by providing strategic guidance and support for Enterprise Information Protection (EIP), IT and business clients. As a Lead SIEM Engineer, you will pl...
Senior SIEM Engineer(virtual remote)
Location : Dearborn, MI
Description Open to US remote Threat Management and Response supports Humana's value proposition by providing strategic guidance and support for Enterprise Information Protection (EIP), IT and business clients. As a Senior SIEM ...
Cyber Security Architect/ Engineer
Location : Farmington Hills, MI
Client: Mercedes Benz Financial Services Title: Cyber Security Architect/ Engineer Location: Farmington Hills, MI (Hybrid) Duration: 12 Months Must to be local candidate Job Description: Minimum 4 years of relevant work...
What I liked about the service is that it had such a comprehensive collection of jobs! I was using a number of sites previously and this took up so much time, but in joining EmploymentCrossing, I was able to stop going from site to site and was able to find everything I needed on EmploymentCrossing.
John Elstner - Baltimore, MD
  • All we do is research jobs.
  • Our team of researchers, programmers, and analysts find you jobs from over 1,000 career pages and other sources
  • Our members get more interviews and jobs than people who use "public job boards"
Shoot for the moon. Even if you miss it, you will land among the stars.
InformationTechnologyCrossing - #1 Job Aggregation and Private Job-Opening Research Service — The Most Quality Jobs Anywhere
InformationTechnologyCrossing is the first job consolidation service in the employment industry to seek to include every job that exists in the world.
Copyright © 2024 InformationTechnologyCrossing - All rights reserved. 168 192