Associate Computer Security Engineer - Cyber Monitoring
Automate your job search with Sonara.
Submit 10x as many applications with less effort than one manual application.1
Reclaim your time by letting our AI handle the grunt work of job searching.
We continuously scan millions of openings to find your top matches.

Overview
Job Description
Seeking a motivated and detail-oriented entry-level Cyber Security Professional to join our Network Monitoring team. This position is ideal for candidates with foundational knowledge in cyber security who are ready to further develop their skills in a dynamic, mission-focused environment. The role is designed for individuals at the entry level. Onsite with limited telework from your primary residence.
The successful candidate will work closely with experienced cybersecurity staff and receive training in cybersecurity policies, best practices, and real-world defensive strategies. This collaborative environment will help the candidate build a strong foundation in both technical and procedural aspects of cybersecurity, while contributing to the protection of critical infrastructure.
DUTIES
- Under regular supervision, assists with the investigation, design, and development of software and/or hardware security.
- Support the security of SRS resources through designing/implementing/evaluating measures tied to the NIST Core Cyber.
- Framework: Identify, Detect, Respond and Recover.
- Safety is a primary responsibility in each job performed. Obtain safety training, obey safety rules. and make safety an integral part of each task. Take the necessary steps to stop work if continuing the job is unsafe or will create an unsafe condition.
- Under regular supervision, assists with the investigation, design, and development of software and/or hardware security technologies for SRS. Work with vendors to develop technical solutions for site computer security needs.
- Maintain the integrity of computer workstations, servers, and networks by maintaining access controls and software lifecycle process as needed.
- Ensure data integrity and confidentiality through implementing the use of both encryption and data retention technologies. Increase technical abilities through specialized vendor training, manuals and technical journals, software seminars, informational meetings, and practical experience.
- Ensure that site/company policies and procedures are tied to customer. requirements and our evaluated for effectiveness and proper implementation.
Education:
- Bachelor degree in an IT related discipline (e.g., Information Technology, Computer Technology. Software Engineering, Computer Science, Computer Engineering);or
- Non-related Bachelor degree with 2 years proven performance in related assignment(s); or
- Associate Degree in IT related discipline (e.g. Information Technology, Computer Technology, Software Engineering,Computer Science, Computer Engineering) with 2 years proven performance in related assignment(s); or
- Non-related Associate Degree with 4 years proven performance in related assignment(s).
- In lieu of degree, a high school diploma with at least 6 years of equivalent knowledge and experience is acceptable.
- Knowledge of computer and network digital systems used in business or process applications. Detailed knowledge in specificoperating systems is desirable.
Experience/Skills:
- Must be able to participate in group problem solving including communicating effectively with both technical and nontechnical personnel,respect the ideas of others and accept the judgment of the group.
- Must be familiar with available resource materials and be able to conduct timely research.
- Must have a sense of when to ask for help and be comfortable in accepting guidance from other more senior technical personnel.
Area Security Access:
- Candidate must be able to obtain and maintain a DOE “Q” security clearance. An active DOE clearance is not initially required to perform assigned duties.
Additional Duties
- Review external indicators of compromise and evaluate them for impact both of potential related traffic and for the effect of adding restrictions based on them.
- Preform review of both quarantined and end user reported emails for evidence of malicious intent.
- Perform administration of logging and other security tooling both at the deployment level and policy configuration.
- Collaborate with team members and management to strengthen the organization’s security posture.
- Monitor network security alerts and assist in responding to potential threats in real time.
- Review and analyze emails for suspected phishing and other malicious activity.
- Ingest and apply threat intelligence to enhance organizational defenses.
- Perform log review and alert management to identify and escalate security incidents.
- Maintain and support cyber security toolsets and ensure their effective operation.
- Assist in the development and implementation of basic security policies and procedures.
Additional Education
- Bachelor’s degree in any field (degree does not need to be in cybersecurity although a degree related to Information Technology is preferred).
Additional Qualifications
Required
- Excellent written and verbal communication abilities.
- Knowledge of basic cybersecurity principles, protections, or frameworks (e.g., NIST).
- Demonstrated willingness to learn new technologies, frameworks, and regulatory environments.
- Ability to work on-site with limited teleworking options.
- Foundational knowledge of log review, alert management, and email security practices.
- Strong analytical and problem-solving skills.
- Attention to detail and a commitment to maintaining high standards of security.
Automate your job search with Sonara.
Submit 10x as many applications with less effort than one manual application.
