
Cyber security engineer DE 2025
- Plzeň, Plzeňský
- Trvalý pracovní poměr
- Plný úvazek
- Evaluates, selects, and applies standard techniques and procedures to perform engineering assignments.
- Provides technical support for testing, installation, and commissioning activities.
- Prepares project documentation within one’s scope of deliverables.
- Finalizes ‘Fail-Safe Philosophy’ and other key concepts as part of Kick-Off and Design Freeze Meetings.
- Actively participates project meetings and resolves any outstanding technical issues to meet contractual obligations.
- Assists in preparing proposal/presentation of engineering
- Applies basic Design Thinking / Design for Excellence concepts in projects.
- Actively utilizes checklists to perform design verification according to applicable standards and engineering guidelines.
- Contributes and shares experiences in workshops pertaining to engineering design, tools, and processes.
- Shares best practices Lessons-Learned documentation across different projects and disciplines.
- Uses standard processes and tools applicable to one’s area of responsibility.
- Ensures that engineering activities comply with required safety regulations and contractual requirements.
- Reports processes and tools inefficiencies and suggests improvements ideas.
- Supports technical risk assessments and implements resulting actions for one’s projects.
- Reports any contract / safety / quality / program / cost issues to Project Manager(s) for resolution.
- Ensures Bill of Material (BOM) for the project meets contractual obligations and project gross margin requirements by not generating Project Left-Over Material (PLOM).
- Identifies and implements variation requests to support contract claims based on the approval from Project Manager.
- Follows work plans and cost estimates provided by the Project Manager and ensures quality deliverables on time and at targeted cost.
- Collaborates with the Supply Chain function and the Project Manager(s) to meet the contractual obligations.
- Coordinates with Manufacturing and Testing functions to ensure the technical solutions are appropriately manufactured/ staged and tested.
- Updates the engineering deliverables as-built.
- Coordinates with Commissioning / Service functions to ensure the designs are appropriately installed and commissioned (if applicable as part of the contract).
- Updates the engineering deliverables post installation & commissioning (if applicable)..
- Ability to set up physical or local sub-networks that separate internal Local Area Networks (LAN) from other untrusted networks
- Knowledge of host/network access control mechanisms
- Knowledge of server and client operating systems configuration and administration
- Knowledge of system hardening techniques
- Knowledge of network protocols such as TCP/IP, DHCP and DNS
- Assess the effectiveness of Cyber Security measures utilized by systems
- Apply cybersecurity functions (e.g., encryption, access control, and identity management) to reduce exploitation opportunities
- Conduct functional and connectivity testing to ensure continuing operability
- Identify, assess, and recommend cybersecurity or cybersecurity-enabled products for use within a system and ensure that recommended products are in compliance with organization's evaluation and validation requirements
- Implement security designs for new or existing system(s)
- Implement specific cybersecurity countermeasures for systems and/or applications
- Install and maintain network infrastructure device operating system software (e.g., IOS, firmware)
- Patch network vulnerabilities to ensure that information is safeguarded against outside parties.
- Determine and document software patches or the extent of releases that would leave software vulnerable
- Provide advice on project costs, design concepts, or design changes
- Provide feedback on network requirements, including network architecture and infrastructure
- Provide cybersecurity guidance to leadership
- Provide input to implementation plans and standard operating procedures
- Translate functional requirements into technical solutions
- Knowledge of resiliency and redundancy of systems
- Knowledge of installation, integration, and optimization of system components
- Knowledge of remote access technology concepts.
- Knowledge of server diagnostic tools and fault identification techniques.
- Knowledge of systems testing and evaluation methods.
- Knowledge of technology integration processes.
- Knowledge of Virtual Private Network (VPN) security.
- Knowledge of network tools (e.g., ping, traceroute, nslookup)
- Knowledge of command-line tools (e.g., mkdir, mv, ls, passwd, grep).
- Knowledge of virtualization technologies and virtual machine development and maintenance.
- Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
- Knowledge of demilitarized zones.
- Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
- Knowledge of network security implementations (e.g., host-based IDS, IPS, access control lists), including their function and placement in a network.
- Knowledge of satellite-based communication systems.