We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Infrastructure Security Engineer

Kansas State University
United States, Kansas, Manhattan
1810 Kerr Drive (Show on map)
Dec 11, 2025
About This Role

The role is with the Security Incident Operations Center (SIOC) team and works to optimize detection capabilities, improve response, and maintain proactive threat response protocols. The security operations engineer ensures that the university's IT assets remain resilient against evolving security threats while delivering high-quality service to stakeholders across the institution.


About Us

Kansas State University's Division of Information Technology is committed to providing excellent IT services to the K-State community in support of the teaching, learning, research, and service missions. They offer a wide range of information technology and communications services. They provide leadership for developing and delivering computing and digital resources to K-State students, faculty and staff. The Division coordinates and manages central IT business services including Enterprise Systems, Portfolio & Project Governance, Infrastructure & Operations, Academic Applications, Information Security, and Academic IT and Research Support.


Worksite Description

This position is On-site.


What You'll Need to Succeed

Minimum Qualifications:



  • Requires a bachelor's degree and three years of relevant experience


Preferred Qualifications:

* Strong knowledge of SIEM platforms (Splunk, IBM QRadar, ArcSight, or similar)
* Experience with network protocols, log analysis, and forensic techniques
* Understanding of common attack vectors and threat actor tactics
* Proficiency in scripting languages (Python, PowerShell, Bash)
* Knowledge of Windows and Linux operating systems
* Familiarity with security frameworks (NIST, MITRE ATT&CK)
* Security certifications (Security+, GCIH, GCFA, CySA+)
* Experience with cloud security monitoring (AWS, Azure, GCP)
* Knowledge of threat intelligence platforms
* Experience with security orchestration and automation tools
* Understanding of malware analysis techniques

Technical Skills
* SIEM administration and log analysis
* Network traffic analysis (Wireshark, tcpdump)
* Endpoint detection and response (EDR) tools
* Vulnerability scanning and assessment tools
* Incident response and digital forensics
* Security information correlation and analysis

Non-Technical Skills
* Strong analytical and problem-solving abilities
* Excellent written and verbal communication skills
* Ability to work under pressure and handle multiple priorities
* Strong attention to detail and accuracy
* Collaborative team player with cross-functional experience
* Continuous learning mindset and adaptability to new technologies

Additional Role Information:

* Occasional after-hours work for incident response or change management work in designated maintenance windows
* Participation in on-call rotation
* Occasional travel required for training, conferences, or other events

Sponsorship eligibility:

Candidates must be legally authorized to work in the U.S. on an ongoing basis without sponsorship


How to Apply

Please submit the following documents:



  • Resume
  • Cover Letter
  • Three Professional References


Application Window

Applications close on: January 31, 2026


Anticipated Hiring Pay Range

$80,000-$105,894



Applied = 0

(web-df9ddb7dc-zsbmm)