Key Skills & Experience
The ideal candidate will be a seasoned professional with 7+ years of experience in security engineering.
This role requires deep, in-depth knowledge of Azure and on-premise security environments, including a strong understanding of network security and firewalls.
location: Cypress, California
job type: Contract
salary: $50 - 80 per hour
work hours: 8am to 5pm
education: No Degree Required
responsibilities:
Qualifications:
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
- Minimum of 7+ years of in security operations or cybersecurity roles.
- Demonstrated experience supporting and integrating security solutions across both on-premises and cloud environments, including:
- Microsoft 365 Security Suite - including Microsoft Defender for Endpoint, Defender for Identity, Microsoft Sentinel (SIEM), Microsoft Purview (compliance), Conditional Access, and Azure AD security features
- Azure Security and Identity - including Azure Security Center, Azure Firewall, Network Security Groups (NSGs), Privileged Identity Management (PIM), and role-based access control (RBAC)
- Palo Alto Networks - including Next-Generation Firewall (NGFW) configuration, policy management, threat prevention, GlobalProtect VPN, and log analysis through Panorama
- Cisco Security Solutions - including Cisco Umbrella (DNS-layer security, secure web gateway), AMP for Endpoints, and Cisco ISE integration
- Cisco and Meraki Networking - including firewall rules, VPN configuration, segmentation, wireless security policies, and traffic monitoring using Meraki Dashboard
- SIEM Platforms - with advanced use of Microsoft Sentinel and experience with log ingestion, custom analytics rules, workbooks, incident management, and threat hunting
- Monitoring and Visibility Tools - including WhatsUp Gold, Azure Monitor, and integration of logs and telemetry for availability, performance, and security insights
- Incident Response and Investigation - including triage, root cause analysis, threat containment, and coordination of corrective actions
- Automation and Alerting - including playbook creation in Sentinel, custom alerting rules, and scripting with PowerShell or Python for response and enrichment workflows.
- In-depth understanding of cloud security best practices, including identity and access management (IAM), RBAC, encryption, and zero-trust architectures.
- Experience with cloud monitoring and logging tools (e.g., Azure Monitor, AWS CloudWatch, Splunk) and automated incident remediation workflows.
- Effective communicator and collaborator, with experience mentoring junior team members and working across cross-functional teams.
qualifications:
Preferred:
- Certifications in CISSP - Certified Information Systems Security Professional, GIAC - Global Information Assurance Certification, CEH - Certified Ethical Hacker, or equivalent
- Experience in cloud-based applications and environments.
- Must live in California
skills: Key Skills & Experience
The ideal candidate will be a seasoned professional with 7+ years of experience in security engineering.
This role requires deep, in-depth knowledge of Azure and on-premise security environments, including a strong understanding of network security and firewalls.
Equal Opportunity Employer: Race, Color, Religion, Sex, Sexual Orientation, Gender Identity, National Origin, Age, Genetic Information, Disability, Protected Veteran Status, or any other legally protected group status.
At Randstad Digital, we welcome people of all abilities and want to ensure that our hiring and interview process meets the needs of all applicants. If you require a reasonable accommodation to make your application or interview experience a great one, please contact HRsupport@randstadusa.com.
Pay offered to a successful candidate will be based on several factors including the candidate's education, work experience, work location, specific job duties, certifications, etc. In addition, Randstad Digital offers a comprehensive benefits package, including: medical, prescription, dental, vision, AD&D, and life insurance offerings, short-term disability, and a 401K plan (all benefits are based on eligibility).
This posting is open for thirty (30) days.
It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
Qualified applicants in San Francisco with criminal histories will be considered for employment in accordance with the San Francisco Fair Chance Ordinance.
Qualified applicants with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act.
We will consider for employment all qualified Applicants, including those with criminal histories, in a manner consistent with the requirements of applicable state and local laws, including the City of Los Angeles' Fair Chance Initiative for Hiring Ordinance.