US, GA - Atlanta, Atlanta
Position Type: 4
Job ID: 24-06112
Apply Now
Responsible for the design, testing, evaluation, implementation, support, management, and deployment of security systems/devices used to safeguard the organization s information assets. Also responsible for analyzing the information security environment and assisting with the development of security measures to safeguard information against accidental or unauthorized modification, destruction, or disclosure. '-Works with the technical team to recover data after a security breach. -Configures and installs firewalls and intrusion detection systems. -Develops automation scripts to handle and track incidents. -Investigates intrusion incidents, conducts forensic investigations and mounts incident responses. -Delivers technical reports and formal papers on test findings. -Installs firewalls, data encryption, and other security measures. -Maintains access by providing information, resources, and technical support. -Ensures authorized access by investigating improper access; revoking access; reporting violations; monitoring information requests by new programming; recommending improvements. -Updates job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations. -Accomplishes information systems and organization mission by completing related results as needed. '-Builds, deploys, and tracks security measurements for computer systems and networks. -Mitigates security vulnerabilities by implementing applicable solutions and tools. -Performs vulnerability testing, risk analyses, and security assessments. -Collaborates with colleagues on authentication, authorization, and encryption solutions. -Tests security solutions using industry standard analysis criteria. -Responds to information security issues during each stage of a project s lifecycle. -Performs risk assessments and testing of data processing systems. -Establishes system controls by developing framework for controls and levels of access; recommending improvements
-Establishes computer and terminal physical security by developing standards, policies, and procedures; coordinates with facilities security; recommends improvements. -Safeguards computer files by performing regular backups; developing procedures for source code management and disaster preparedness; recommends improvements. '-Determines the sensitivity of the data in order to recommend the appropriate security needs. -Develops proposals for, and consider cost effective equipment options to satisfy security needs. -Communicates with the technical team, management team and users companywide if data security is breached. -Designs infrastructure to alert the technical team of detected vulnerabilities. -Evaluates new technologies and processes that enhance security capabilities. -Supervises changes in software, hardware, facilities, telecommunications and user needs. -Defines, implements, and maintains corporate security policies. -Analyzes and advises on new security technologies and program conformance. -Creates, tests, and implements network disaster recovery plans. -Recommends security enhancements and purchases. -Trains staff on network and information security procedures. -Develops security awareness by providing orientation, educational programs, and on-going communication. -Recommends modifications in legal, technical and regulatory areas that affect IT security.

Top 5 skills are as follows:

Microsoft Intune
Microsoft BitLocker Administrator
Microsoft Purview
Microsoft 365
Microsoft Azure

Are you seeking to work on a team of professionals protecting one of the world s largest global air lines? As a Data Protection Engineer at Air Lines you ll be collaborating with multiple teams to support data protection. You ll have the opportunity to contribute to an expanding Data Protection program and assist in implementing best practices.

As a Data Protection Engineer, you will implement solutions to help safeguard Airline s most sensitive data. You will be responsible for architecting, implementing, documenting, and maintaining Data Protection technologies such as BitLocker endpoint encryption. The Data Protection team seeks a self-motivated, flexible individual who is always looking for a way to improve and protect our environment.

Your Responsibilities in this Role:

Lead the implementation and migration to Microsoft Intune at an enterprise scale.

Design and implement security policies and configurations for device management with Microsoft Intune.

Recommend best practices and test new features of the product.

Provide training and support to partner teams and end users on new security features.

Collaborate with business partners who could benefit from the new tools, assisting with implementing new use cases.

Continuously monitor and optimize the performance and security of the solution.

Administer data protection tools including patching, upgrading, troubleshooting, testing and report generation.

Develop new policies using regex, machine learning, fingerprinting, and/or dictionaries to monitor unique data types.

Review existing deployment architecture, engineering, and policies and assess overall deployment against best practices.

Evaluate and build new data protection solutions in alignment with cloud requirements. Operationalize these solutions to deliver value to the business.

Implement protective controls in the cloud to ensure the confidentiality, integrity, and availability of data.

What are We Looking for?

Bachelor s degree in Cybersecurity, Information Technology, Computer Science, or related field.

At least 3 years of experience working with Microsoft 365 technologies including Microsoft Intune and Microsoft Purview.

Experience administering Microsoft BitLocker Administration and Monitoring (MBAM) solution.

Strong technical knowledge of secure architectures, system policies, rules, etc.

Experience with designing and automating data protection strategies for cloud environments.

Familiar with securing structured and unstructured data.

Experience working with Data Loss Prevention (DLP) solutions.

Experience managing Cloud Access Security Broker (CASB) solutions.

Experience with deploying and managing data classification solutions.

Experience with managing devices using policies in Microsoft Intune.

Understanding of regulatory structures such as PCI and GDPR.

Creative and adaptive work ethic, with a strong customer-oriented attitude.


Professional certifications such as CISSP, CISM, CEH, Security+, or SANS GIAC.

Cloud certifications such as Microsoft Certified Security, Compliance, and Identity Fundamentals.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. NLB is committed to providing access, equal opportunity and reasonable accommodation for individuals with disabilities in employment, its services, programs, and activities. To request reasonable accommodation, contact HR department by sending an e-mail to notifications@nlbservices.com.
Apply Now

    Submit Resume

    By registering, you confirm that you agree to the storing and processing of your personal data by NLB Services as described in the Privacy Statement.