About Crownpeak 

At Crownpeak, we provide a cutting-edge, composable Digital Experience Platform (DXP) that helps global enterprise and retail organizations enhance their digital presence and drive growth. Our platform enables the rapid creation of tailored digital experiences through the combination and orchestration of best-in-class content marketing tools, resulting in powerful customer engagement and long-term loyalty.  

Our solution is unique in that it’s designed to streamline and accelerate marketing and IT workflows, allowing teams to efficiently deliver and manage end-to-end digital experiences to any touchpoint, device or channel from the start, faster than ever before.  

Our mission is to revolutionize the digital landscape for global enterprises and retail organizations. We do this by providing a customizable and composable platform that seamlessly blends speed, simplicity, and adaptability in crafting unique, accessible digital experiences that align with the evolving needs of their customers. Our ultimate goal is to drive customer satisfaction and loyalty through unparalleled digital experiences. 

Our vision is to transform the digital realm by crafting a platform that embodies speed, simplicity, and adaptability. We aim to empower businesses to effortlessly respond to the ever-changing demands of their customers, promoting inclusivity through exceptional digital experiences.  

Join us and make an immediate impact in the digital world. 

What’s the role? 

We're looking for a Senior Systems Engineer to design and implement secure infrastructures across both cloud and on-premises environments, ensuring robust security postures against cyber threats. This role acts as a crucial asset for the IT team and the entire organization, blending technical acumen with strategic insight to enhance operational efficiency, security, cost optimization, and drive overall business success. 

What will you do? 

  • Design and Deploy Secure Architectures, craft and implement robust security architectures across diverse environments, including cloud platforms like AWS and Azure, as well as on-premises setups using VMware and Linux. This includes the integration of essential security tools and technologies such as firewalls and intrusion detection systems to fortify infrastructure against cyber threats. 
  • Manage Security Configurations, configure and uphold security settings across cloud platforms, various operating systems including Linux and Windows, and endpoint management systems like Intune. This encompasses maintaining up-to-date security measures to safeguard against vulnerabilities. 
  • Conduct Security Audits and Assessments, regularly perform thorough security audits and vulnerability assessments. This is key to identifying potential security risks, ensuring the organization's infrastructure remains impervious to cyber threats. 
  • Respond to Security Incidents, analyse and respond to security incidents with precision, identifying root causes and implementing containment strategies. This involves documenting incidents meticulously to refine future security strategies and responses. 
  • Develop Security Policies and Procedures, formulate comprehensive security policies and procedures that resonate with organizational needs and best practices. Part of this responsibility includes educating the IT staff and users on these policies, ensuring a widespread understanding and adherence. 
  • Automate Security Tasks, identify opportunities for automation within security processes and implement scripts or use orchestration tools to enhance efficiency. Monitoring these automated processes for anomalies is also crucial to maintain operational integrity. 
  • Manage User Access and Permissions, administer and enforce access control mechanisms to ensure users have appropriate levels of access, adhering to the principle of least privilege. This includes monitoring for suspicious activities and managing roles and permissions effectively. 
  • Collaborate for Comprehensive Security, work alongside various IT teams and business stakeholders to foster a holistic security approach. This entails communicating effectively about security risks and recommendations, ensuring security measures are well understood and implemented across the board. 

Who are you? 

We don't believe in ticking boxes here at Crownpeak. 

Here are a few skills that we feel would make you successful in the role, but we’d still love to hear from you if you feel you’d be a great fit. 

  • Solid understanding of security principles, including knowledge of key security concepts, frameworks such as the National Institute of Standards and Technology (NIST) and Center for Internet Security (CIS) Controls, and best practices like defence in depth and the principle of least privilege. 
  • Expertise in a major cloud platform (Amazon Web Services or Azure) with skills in designing, deploying, and managing secure infrastructures, configuring security services, and troubleshooting within these environments. 
  • Proficiency in endpoint management using Intune, demonstrating capabilities in configuring security policies, deploying applications, and managing devices and endpoints to ensure security compliance. 
  • Experience with security tools and technologies, familiar with the deployment and management of firewalls, intrusion detection/prevention systems, security information and event management (SIEM) platforms, and vulnerability scanning tools. 
  • Scripting and automation skills, proficient in scripting languages such as Python or PowerShell to automate security tasks, thereby enhancing efficiency and security posture. 
  • Strong communication and collaboration skills, capable of working effectively with cross-functional teams, clearly communicating complex security concepts, and documenting procedures effectively. 
  • Passion for continuous learning, with a demonstrated commitment to staying informed about evolving security threats, vulnerabilities, and best practices through ongoing education and professional development. 

It would also be a plus if you had: 

  • Incident response and threat hunting capabilities, with an understanding of incident response processes, the ability to analyse security logs, identify suspicious activities, and engage in threat hunting initiatives. 
  • Linux administration skills, showcasing a strong foundation in Linux server administration tasks such as package management, user and group management, and file system permissions. 
  • VMware administration experience, capable of managing VMware environments including VM creation, configuration, resource allocation, and troubleshooting. 

 

What can we offer you? 

We offer competitive salaries, great colleagues and excellent benefits. 

 

Our Culture  

We strive for success, are always pushing to do better, and work with pride and purpose together. You can see them in action in all aspects of our everyday work. 
Today we are a 330+ team with Crownpeeps in the US, Ireland, UK, France, Luxembourg, Netherlands, Germany, Poland and Bulgaria. 

Check out more about life as a Crownpeep on Linkedin and Instagram @crownpeak. 

Crownpeak is proud to have a widely diverse team. We are committed to creating an inclusive environment where everyone, whoever they are, feels comfortable to be themselves and each person is valued for their skills, experiences, and unique perspectives. 
Crownpeak celebrates all talents. All of our positions are open to people with disabilities and we give them the means and opportunity to express all of their skills. 

*By applying for this position, you are agreeing to our Candidate Privacy Notice. 

  

Apply for this Job

* Required
resume chosen  
(File types: pdf, doc, docx, txt, rtf)


Our system has flagged this application as potentially being associated with bot traffic. Please turn off any VPNs, clear your browser cache and cookies, or try submitting your application in a different browser. If this issue persists, please reach out to our support team via our help center.
Please complete the reCAPTCHA above.