We are seeking a motivated and technically capable Security Engineer to join our team supporting enterprise security operations. This role is ideal for candidates with at least 1 year of IT or cybersecurity experience who are looking to grow in a hands-on security engineering role. You will be responsible for implementing, monitoring, and managing various security tools, supporting incident response, and assisting in the continuous improvement of the security posture for our clients. You'll be part of a dynamic team ensuring protection of critical systems and infrastructure while gaining exposure to enterprise-grade tools and environments.
- Monitor and manage security infrastructure and tools in scope (e.g., AV, DLP, EDR, DAM, PKI, PAM, HSM, Vulnerability Scanner, SIEM) - Receive and respond to security incidents and events via established workflows and automation tools - Support configuration and troubleshooting of infrastructure security solutions, including: - DLP, AV, HIPS (Trellix) - EDR (Carbon Black) - DAM (Imperva) - SLIFT encryption - Log and SIEM (Splunk) - Microsoft CA PKI - RSA 2FA and CyberArk (PAM) - Luna HSM (Thales) - Tenable Nessus SC
- Act as the escalation point for infrastructure-related incidents during office hours and provide standby/on-call support - Assist in analysis, containment, and remediation of security incidents - Prepare and maintain incident records, reports, and lessons learned documentation
- Conduct regular vulnerability scans and assist with patching/remediation coordination - Maintain awareness of known threats and assist in threat hunting activities - Help maintain the security risk register and support identification of recurring issues or weak points
- Generate and maintain standard operating procedures (SOPs), knowledge articles, and technical documentation - Support the development of regular service and incident reports - Assist in compliance reporting and audits
- Engage with internal and client teams to understand business requirements and provide technical support - Maintain awareness of industry trends and security best practices - Participate in training to improve knowledge of tools and response processes
- Familiarity with network and host security technologies (EDR, AV, HIPS, DLP, Firewalls) - Basic understanding of SIEM platforms (e.g., Splunk), PKI, and log correlation - Experience in working with or supporting some of the following: - Trellix Endpoint Security (AV, DLP, HIPS) - Carbon Black EDR - Imperva DAM - Microsoft PKI and Certificates - CyberArk and RSA 2FA - Tenable Nessus Security Center - Luna HSM (Thales)
- Understanding of information security principles, CIA triad, and risk assessment basics - Exposure to Windows and Linux environments - Ability to create basic documentation and reports - Willingness to take initiative and learn from senior engineers
- Degree or diploma in Information Technology, Cybersecurity, or related field - 3+ years experience in IT or security operations (internship, NOC, SOC, or IT support roles are acceptable) - Familiarity with security concepts, tools, or certifications (even entry-level) is a strong plus
- CompTIA Security+ - Microsoft SC-900 / AZ-900 - EC-Council CEH (or equivalent) - Any vendor training (e.g., Trellix, Carbon Black, Splunk Fundamentals)
At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We're committed to fostering an inclusive environment where everyone can thrive.
Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.