Phoenix Cyber is looking for a Data Protection Engineer to join our client delivery team. This is a remote, work-from-home position with the possibility of minimal travel within the continental United States.
Requirements:
- 5+ years’ experience with defining an Endpoint data protection program (such as ForcePoint DLP) for a large enterprise.
- 5+ years’ experience with defining an email Data Protection program with a full lifecycle approach for a large enterprise.
- Experience with Regex
Description:
- Ability to assess DLP configuration, infrastructure and assess data loss prevention (DLP) options.
- Assess different DLP endpoint protection tool options and help the customer choose the best option.
- Develop DLP design, design DLP integrations and assess enterprise reporting capability.
- Configure DLP reporting capabilities, develop Endpoint system test plans and configure Endpoint policies in monitoring mode.
- Must have the ability to assess Microsoft Office 365 email configuration, infrastructure, email flow and assess data loss prevention (DLP) options.
- Responsible for developing O365 email DLP design, design DLP integrations, have experience with reviewing email Standard Operating Procedures (SOP’s), and assess enterprise reporting capability.
- Responsible for configuring DLP reporting capabilities, develop email system test plans and configure O365 Email DLP policies in monitoring mode.
- Monitor O365 email alerts, review and categorize alerts, coordination with business process and owners to move to secure information exchange, develop risk reduction plan, DLP policies testing and tune, and User acceptance testing (UAT).
- Monitor endpoint alerts, review and categorize alerts, coordination with business process and owners to move to secure data exchange, develop risk reduction plan, DLP policies testing and tune, and User acceptance testing (UAT).
Requirements:
- Secret Clearance
- Active: CySA, CEH, SSCP, or GICSP Certification
Phoenix Cyber is a national provider of cybersecurity engineering services, operations services, sustainment services and managed security services to organizations determined to strengthen their security posture and enhance the processes and technology used by their security operations team.
Phoenix Cyber is an equal opportunity employer and complies with Executive Order 11246, Section 503 of the Rehabilitation Act of 1973, the Vietnam Era Veteran's Readjustment Assistance Act (VEVRAA), all amendments to these regulations, and applicable executive orders, federal, and state regulations. Applicants are considered without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, and/or veteran status.
Phoenix Cyber participates in E-Verify to confirm the employment eligibility of all newly-hired employees. To learn more about E-Verify, including your rights and responsibilities, go to https://www.e-verify.gov/
Top Skills
What We Do
Phoenix Cyber is a national provider of cybersecurity engineering, operations, and sustainment services to enterprise and government organizations determined to strengthen their security posture and enhance the processes and technology used by their security operations center. Our team comprises senior cybersecurity consultants and engineers with expertise in architecting results-oriented, cybersecurity frameworks; and the operational processes to ensure accurate incident detection, enrichment, and response. Our unique blend of security automation, orchestration, and proven best practices differentiates Phoenix-architected solutions from traditional cybersecurity services.
Cybersecurity Services
- Security Engineering (plan, architect, design, implement, integrate, document, and optimize)
- Security Operations (identify, protect, detect, respond, recover processes and best practices)
- Sustainment Services (manage, maintain, update, upgrade, optimize, support)
- Federal Government Services (contracts with U.S. Navy, FAA, DLA, and CIO-SP3)
Capabilities
- Data Protection
- Endpoint Security
- Network Security
- Perimeter Security
- Phishing Detection and Response
- Security Orchestration, Automation, and Response (SOAR)
- SIEM
- Threat Intelligence
- Threat Hunting
Security Tools
AWS, Microsoft, Swimlane, UiPath