
Cybersecurity Specialist – Platform, Architecture
TD SYNNEX
full-time
Posted on:
Location Type: Remote
Location: Florida • North Carolina • United States
Visit company websiteExplore more
Tech Stack
About the role
- Develop, implement, and maintain cybersecurity policies, procedures, and standards.
- Design, implement, and integrate security controls and technologies, collaborating with IT teams.
- Provide guidance and support on security-related matters, and stay informed on emerging threats and best practices.
- Assist in the configuration and collection of security log events using SIEM, and support related integrations activities.
- Maintain operational documentation, adhere to change control processes, and support automation scenarios.
- Ensure compliance with legal and regulatory IT security requirements.
Requirements
- 4+ years relevant experience in IT
- Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field; or equivalent experience
- Privilege Management
- Email Security
- Infrastructure Security – AD, EntraID, protocols, cloud etc.
- Logging technology integration and support
- SIEM technology – integration and support
- Hardening Procedures
- Endpoint & Identity Protection – technology and support (incl. cloud security)
- Strong knowledge of foundational security principles
- Strong understanding of operating systems, and web technologies
- In-depth knowledge of cybersecurity principles, practices, and technologies, including encryption, authentication, and access control mechanisms
- Experience with security tools such as SIEM, firewalls, web proxy, endpoint protections or others
- Cloud technologies and processes (Azure/AWS – security groups, hardening)
Benefits
- Health insurance
- Paid leave
- Retirement plans
- Professional development programs
- Wellness programs
- Diversity, Equity & Inclusion initiatives
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
cybersecurity policiessecurity controlsSIEMPrivilege ManagementEmail SecurityInfrastructure SecurityLogging technology integrationHardening ProceduresEndpoint ProtectionIdentity Protection
Soft skills
guidancesupportcollaborationcommunication