Skip to content
  Friday 5 December 2025
Trending
October 3, 2023Cybersecurity Intel Analyst (TS/SCI Clearance Required) May 15, 2025<h3>Stunning Verdict: Celsius CEO Sentenced to 12 Years in Prison</h3> February 28, 2025Over 12,000 Exposed API Keys and Passwords Uncovered in Public Data for LLM Training February 5, 2025CISA Releases Nine Industrial Control Systems Advisories November 1, 2024<h3>Inside a Researcher’s Thrilling Journey into IoT Device Hacking</h3> January 29, 2025Cybersecurity Engineer September 3, 2025Preventing Data Disasters: How to Spot Leaks Early June 12, 2025Lead Cybersecurity Integrated Architect January 12, 2025Cybersecurity Project Manager December 11, 2024AI Is Crucial for Improving Anti-Counterfeiting Systems
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Careers  Senior Cybersecurity Engineer
Careers

Senior Cybersecurity Engineer

SecuredyouadmSecuredyouadm—March 20, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Description :Cybersecurity Engineer – Zero Trust & DLP SpecialistHybrid Schedule with Office Located in Houston, TexasAbout Bray InternationalBray International is a leading provider of industrial valves, actuators, and related control products, offering innovative flow control solutions worldwide. As a privately-owned business with over 30 years of engineered excellence, Bray is known for its commitment to excellence, integrity, and collaboration. Join our team to become part of a dynamic, forward-thinking organization shaping the future of flow control solutions.Why Work for Us?Bray offers a competitive and comprehensive benefits package, including:

  • Competitive Pay Plans
  • Comprehensive Benefits: Medical, dental, vision, and life insurance; Paid holidays and vacation; 401(k) with matching contributions.
  • Healthy Work Environment: A smoke-free, drug-free workplace ensuring safety and productivity.
  • Career Growth: Opportunities for professional development and advancement.
  • An Exceptional Company Culture: Bray is a privately-owned business committed to engineered excellence.
More stories

Operational Technology Cybersecurity Engineer

February 16, 2025

Cybersecurity SME III ZTA Program Task Lead

October 4, 2024

Senior Systems Engineer, Cybersecurity (IAM Cloud Engineer)

October 3, 2023

Lead Cybersecurity Recovery and Resiliency Engineer

July 31, 2024

Position Summary: We are seeking a highly skilled and experienced Cybersecurity Engineer to join our dynamic team. The ideal candidate will have a strong background in Zero Trust Networking and Data Loss Prevention (DLP). This role is responsible for designing, implementing, and maintaining robust security measures to protect our organization’s data and systems. The position requires extensive experience in cybersecurity, strong problem-solving skills, and the ability to mentor junior analysts. Additionally, you will collaborate with cross-functional teams to design and enforce comprehensive security architectures and strategies.Essential Job Functions and Responsibilities:Core Responsibilities:

  • Develop and deploy Zero Trust security models to ensure secure access to resources, regardless of location or device.
  • Implement and manage DLP solutions to prevent unauthorized access, use, or transmission of sensitive data.

Additional Responsibilities:

  • Monitor network activity for suspicious behavior, respond to security incidents, and ensure compliance with industry standards and regulations.
  • Troubleshoot complex security issues with a deep understanding of network protocols.
  • Collaborate with IT team members to develop and enforce security policies and best practices.
  • Conduct regular security assessments, identify vulnerabilities, and develop strategies to mitigate risks.
  • Respond to complex security incidents, including investigation, containment, and remediation.
  • Conduct in-depth threat analysis and oversee incident response efforts.
  • Incorporate lessons learned from incident investigations to improve monitoring, alerting, and automation capabilities.
  • Oversee the maintenance and updating of security documentation, including incident reports and security logs.

Qualifications and Core Competencies:Required Core Competencies:

  • Strong understanding of Zero Trust principles and frameworks (e.g., NIST SP 800-207).
  • In-depth knowledge of network protocols and security best practices.
  • Expertise in DLP technologies and solutions, including configuring and managing DLP policies and rules.
  • Strong understanding of data classification and protection methodologies.
  • Ability to analyze and respond to DLP alerts and incidents.
  • Experience with data discovery and classification exercises.

Additional Qualifications and Competencies:

  • Proficiency in security tools and technologies, including firewalls, IDS/IPS, SIEM, Endpoint Detection and Response, Email Security, and Web Security.
  • Familiarity with advanced security solutions such as data loss prevention, on-prem and cloud proxy, secure service edge, web application firewall, zero trust, and remote access.
  • Experience with penetration testing tools and methodologies (e.g., Nmap, Metasploit, Burp Suite).
  • Strong knowledge of TCP/IP, VPNs, IDS/IPS, and firewall configurations.
  • Experience with other networking vendors and technologies (e.g., Juniper, switching & routing, TCP/IP, DHCP, DNS, end-to-end QoS, VRRP, LACP, MLAG, ACLs).
  • Experience with cloud security platforms (AWS, Azure).
  • Familiarity with Microsoft Defender Suite, Intune, and Azure.
  • Experience with compliance frameworks such as ISO 27001, NIST, and GDPR.
  • Proficient in using firewall management tools (Palo Alto, Meraki, IPSec, Global Protect VPN, Cisco AnyConnect).
  • Expertise in troubleshooting and resolving complex technical issues.

Performance Standards:

  • Promote best practices like NIST CSF within the IT Security team.
  • Ensure NIST CSF compliance for the IT team.

Read More

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Manager, Cybersecurity
Lead Cybersecurity Governance Specialist
Related posts
  • Related posts
  • More from author
Careers

Senior Manager, Cybersecurity IR and SOC

December 4, 20250
Careers

Senior Manager, Cybersecurity GRC

December 4, 20250
Careers

Cybersecurity Analyst

December 4, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Threat Advisories

SolisCloud Monitoring Platform | CISA

December 4, 20250
Threat Advisories

Advantech iView | CISA

December 4, 20250
Threat Advisories

Johnson Controls iSTAR | CISA

December 4, 20250
Careers

Senior Manager, Cybersecurity IR and SOC

December 4, 20250
Careers

Senior Manager, Cybersecurity GRC

December 4, 20250
Careers

Cybersecurity Analyst

December 4, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • SolisCloud Monitoring Platform | CISA
  • Advantech iView | CISA
  • Johnson Controls iSTAR | CISA
  • Senior Manager, Cybersecurity IR and SOC
  • Senior Manager, Cybersecurity GRC

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures