Cybersecurity Engineer Lead - Military veterans preferred

2024-09-19
University of Kentucky
Other

/yr

  employee   contract


Lexington
Kentucky
40502
United States


University of Kentucky

Equal Employment Opportunity/M/F/disability/protected veteran status.

Posting Details

Posting Details

Job TitleCybersecurity Engineer LeadRequisition NumberRE47284Working TitleDepartment Name3L800:ITS Security & PolicyWork LocationLexington, KYGrade Level49Salary Range$72,405-119,496/yearType of PositionStaffPosition Time Status Full-TimeRequired Education
BS
Click here for more information about equivalencies:https://hr.uky.edu/employment/working-uk/equivalenciesRequired Related Experience
5 yrs
Required License/Registration/Certification
None
Physical Requirements
The essential job functions of this position require you to be indoors; sit for extended periods of time; handle light-weight objects up to 25 pounds; operate a phone and a computer (with regular repetitive motions, such as typing) and navigate multiple computer systems. Ability to travel to various locations on and off-campus for meetings.
Shift
Primarily days (i.e. Monday – Friday, 8:00am – 5:00pm) Please be aware that as an exempt position, job duties may occasionally require additional time in the evenings, nights and/or weekends to accomplish work goals in excess of 40 hours per week.
Job Summary
The Lead Cybersecurity Engineer is a senior technical role within the cybersecurity team, responsible for the strategic oversight and execution of cybersecurity operations, incident response, cloud security management, and vulnerability assessment. This position collaborates closely with the Director of Cybersecurity, the Enterprise Cybersecurity team, and cross-functional teams to ensure the security of the organization’s IT infrastructure and compliance with regulatory (e.g. HIPAA, FERPA, ITAR, PCI-DSS) requirements. The role involves leading efforts in cyber defense analysis, managing the cybersecurity incident response program, and providing technical guidance for cloud and on-premises environments.

There is an internal employee being considered for this position (IEBC).
Skills / Knowledge / Abilities
BS or equivalent experience.
Cybersecurity certification preferred (e.g. GIAC, ISC2, Microsoft, Splunk, EC-Council).
Experience in network protocol analysis, log analysis, perimeter security technologies.
Experience with Microsoft Defender, Qualys, Tenable, Bloodhound, Mimikatz, Kali, Splunk, Crowdstrike, and Palo Alto and Cisco firewalls.

Does this position have supervisory responsibilities? YesPreferred Education/Experience
Degree in Information Technology, Information Assurance/Security or equivalent highly preferred
Deadline to Apply09/25/2024Our University Community
We value the well-being of each of our employees and are dedicated to creating a healthy place for everyone to work, learn and live. In the interest of maintaining a safe and healthy environment for our students, employees, patients and visitors the University of Kentucky is a Tobacco & Drug Free campus.


As an Equal Opportunity Employer, we strongly encourage veterans, individuals with disabilities, women, and all minorities to consider our employment opportunities.


Any candidate offered a position may be required to pass pre-employment screenings as mandated by University of Kentucky Human Resources. These screenings may include a national check and/or drug screen.


Posting Specific Questions

Required fields are indicated with an asterisk (*).

  1. * Describe a complex security project you have led. What were the key challenges, and how did you overcome them?

    (Open Ended Question)

  2. * How do you stay current with emerging cybersecurity threats, and how do you incorporate that knowledge into your organization's cyber defense strategy?

    (Open Ended Question)

  3. * Describe your experience in leading incident response efforts. How did you coordinate with different teams, and what were the key takeaways from the incident?

    (Open Ended Question)

  4. * Describe a time when you had to conduct a vulnerability assessment for an organization's IT infrastructure. What tools and methodologies did you use, and how did you prioritize remediation efforts?

    (Open Ended Question)

  5. * Can you provide an example of how you managed cloud or a hybrid environment's security while ensuring compliance with regulatory requirements (e.g., HIPAA, FERPA, PCI-DSS)?

    (Open Ended Question)

  6. * Where did you first see this position advertised other than on UK's online employment system?
    • HigherEdJobs.com
    • Diverseeducation.com (Diverse Issues in Higher Education)
    • HERCjobs.org (Higher Education Recruitment Consortium)
    • InsightIntoDiversity.com
    • Latinosinhighered.com
    • Indeed.com
    • A Colleague, Friend and/or Family Member
    • UK Job Fair
    • None of the Above

Applicant Documents
Required Documents
  1. Resume
  2. Cover Letter
Optional Documents








    PI249941999