Cyber Security Tools Engineer contract job advert
Job Title

Cyber Security Tools Engineer (OVA/ OCF) 5458

Job Ref No



€550 per day

Start Date



Cyber Security




Mons, Belgium

Cyber Security Tools Engineer

Great contract role for a Cyber Security Tools Engineer (OVA/ OCF) The contract term is 1 year plus. This role is based in Mons. NATO Clearance is needed for this contract.

Contract -Duties & Role:

Act as one of the engineers and Subject Matter Expert (SME) for cyber tools used for Vulnerability Assessment, Forensics and Malware Analysis (MA) (further referred as cyber tools) within the Cyber Security Tools team.
As the SME, provide advice and technical assistance to other stakeholders, maintain technical expertise, awareness, and developments in related new technologies, and provide technical contributions to any projects related to the cyber tools.
Be responsible for management and further development of the cyber tools.
Following ITIL standards, provide support to Operations and Service Delivery management covering all stages of the cyber tools lifecycle (e.g. Service Design, Transition, Operations, Change Management and Continual Service Improvement).
Cyber tools must be installed, configured, and operating correctly and in line with dependencies with others systems or applications required.
Also, system components are continuously monitored and take appropriate technical and non-technical actions for solving detected issues.
Make sure cyber tools operate within any KPI’s, as defined in Service Level Agreements with NCSC customers.
Support integration with external tools and any associated activities.
Proactively identify and propose system improvements to ensure an up-to-date and stable environment. Justify business needs, prepare documentation and implementation plan for the Change Management Board. Implement the approved changes following co-ordination with other stakeholders.
Coordinate with service delivery managers, end users and other stakeholders in support of related services; communicate with other NATO entities as well as industry partners where required.
Develop and maintain documentation guidelines, standard operating procedures, system and service design documents and other relevant documentation that support management of the cyber tools.
Create technical and/or executive level reports as required; organise and deliver presentations and briefings for various audience up to NATO executive level.
Perform other duties as required.

Expected outcomes:

Under the direction of the STMS Section Head, Tools Lead Engineer or delegated authority, the incumbent shall deliver the following:

Daily tasks:

Work in close collaboration with the Service Delivery Managers (SDM) and the Lead Engineer on assigned tasks and upcoming deliverables.
Report on system status, results of the health checks and details on any issues identified.
In case of any issues, preparation of a resolution plan and any applicable mitigations. The initial plan has to be prepared within 1 working day.
Manage the ticket queue related to the tools under incumbent’s responsibility. The incumbent will respond to all critical within the same day. High tickets require a response the next day the latest. All other tickets shall be updated at least once a week.


Firstly, give a brief summary of current situation with ongoing tickets.
It shall include:
Critical as well as system affecting high tickets,
Identified issues, already present or expected in the future.
Performance Standards:
Timely delivery of the reports and briefs.
The section head, SDM and/or team lead will regularly assess quality of the deliverables.
Reports shall contain key elements such as date and time of system checks, expected outcome, observed situation.
Essential to have a Bachelor’s Degree in Computer Science combines with a minimum of 2 years’ experience in Cyber Security related post as a Security Engineer or similar position, or a Secondary education and completed advanced vocational education (leading to a professional qualification or professional accreditation) with 5 years post-related experience.

Skill, Knowledge & Experience for this role:


Firstly, 1 year plus of extensive practical experience as an engineer in large enterprise environment (administration, deployment, installation, configuration and maintenance) managing forensics or vulnerability management tools and applications.
Secondly, demonstrate experience of analysing and interpreting system, security and application logs in order to diagnose faults and spot abnormal behaviours.
Must have a good understanding of Linux plus Windows system, applications administration and troubleshooting.
Demonstrate work autonomously and proactively, to understand the chain of command and to follow internal processes.
Lastly, good communication skill and needed, and must be able to articulate complex issues to a variety of audiences.


Extensive practical experience with vulnerability management products – Tenable Security Center, Tenable Nessus products.
practical experience with forensics products – AccessData, Fidelis and Encase.
Strong practical experience with malware analysis products – Cuckoo, Opswat Metascan.
Experience with system instrumentation and automation solutions such as Ansible and Chef.
Practical skills in writing Bash, Python or Ansible scripts to support repetitive tasks automation.
Practical skills in writing Powershell scripts to support repetitive tasks automation.
Experience with GIT
Industry leading certification in the area of Cyber Security such as CISSP, CISM, MCSE/S, CISA, GSNA, SANS GIAC and CFCE.

Apply for this Cyber Security Tools Engineer role today

Search of other suitable roles on our jobs page

Back to Jobs