Explore careers with our portfolio companies

Cyber Security Engineer

Follett Learning

Follett Learning

Multiple locations · Texas, USA · Reston, VA, USA · Salt Lake City, UT, USA · London, UK · Houston, TX, USA · McHenry, MS, USA · Cincinnati, OH, USA · Boston, MA, USA · Fort Worth, TX, USA · Nashville, TN, USA · North Carolina, USA · Research Triangle Park, Durham, NC, USA · Cleveland, OH, USA · Portland, OR, USA · South Carolina, USA · Philadelphia, PA, USA · Las Vegas, NV, USA · Minneapolis, MN, USA · Arizona, USA · Tampa, FL, USA · Tucson, AZ, USA · Birmingham, UK · Boise, ID, USA · Atlanta, GA, USA · Chicago, IL, USA
Posted on Saturday, May 25, 2024

Position Overview:

Under the guidance of Director of Information Security, the Cyber Security Engineer will be responsible for administering and implementing enterprise information security architecture and technology solutions to address the emerging security and compliance needs of the business.

Serves as a subject matter expert for cyber secure system architectural design, and configuration. Administers and implements secure infrastructure and assists other teams in securing their architectures.

Expert knowledge of security concepts and best practices for technologies including (but not limited to):

  • Next Generation Firewalls, logging and monitoring, authentication systems, Vulnerability Management, remote access solutions (VPN, SSL, IPSEC) with two factor authentication, network access control, network security monitoring, Traffic analysis, Active Directory / Entra ID, etc.
  • Additional familiarity of security concepts and best practices for technologies including (but not limited to):
  • Microsoft Windows, MS Active Directory, MS Azure, RedHat Linux, F5 load balancing or proxy technologies.


Network Security

  • Management of Next Generation Firewalls for network segmentation and traffic analysis (defense in depth model).
  • Validate network perimeters within multiple cloud environments.
  • ZTNA (Zero Trust Network Access) remote Access Solutions management.
  • Administration of logging data that feeds into the SOC

Infrastructure Security

  • Threat and vulnerability assessments using scanning products such as Rapid 7 or Qualys.
  • Track vulnerabilities and drive resolution / remediation across multiple teams.
  • Daily monitoring, review, and administration of enterprise security toolsets
  • Researching new security technologies and making recommendations to strengthen the security posture.

Application and Cloud Security

  • Design and implements security controls for application development.
  • Works with IT teams to devise and implement secure cloud environments.
  • Coordinate with development teams to push for secure coding practices
  • Provides technical guidance on security best practices to network, infrastructure, and application development teams.

Security Operations

  • Provide subject matter expertise to project and vendor management teams based on documented policies.
  • Works closely with our 3rd-party security operations center (SOC). Oversees the relationship with the vendor, driving them to better detection capabilities.
  • Participates in tracking cyber security technology performance reviews, and generation of operational metrics to be reported to the Senior leadership team.
  • Respond to activities deemed to be improper or in violation of Information Security policies.
  • Provide input into annual risk assessment, security awareness training program, ongoing security based projects, updating security policies, security incident response procedures as directed by Dir, Information Security.


Demonstrated technical expertise and comprehensive knowledge of securing enterprise infrastructure. Strong team player with excellent analytical, technical, and communication skills. Ability to communicate across all organizational levels, particularly Application Development teams. Problem solving skills. Familiarity with Cloud Based operations and SaaS environments required.

Technical Experience:

To be successful in this position the candidate must have knowledge and experience of the following:

  • Experience with Next Generation Firewalls.
  • Experience maintaining remote access solutions (end user VPN, ZTNA).
  • Experience with Authentication systems (such as Active Directory).
  • Experience with SIEM products (desired).
  • Experience with Vulnerability Management (Tenable, Rapid7, Qualys etc.)
  • Experience with system log collection and correlation.
  • Experience with Endpoint Detection and Response tools (EDR or XDR).
  • Knowledge of Source Code scanning tools.
  • Knowledge of network authentication protocols (e.g., RADIUS, LDAP).