We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Security Engineer 2 - Cyber Security - Wheeling, WV

WesBanco Bank Inc.
United States, Ohio, Uniontown
1559 Corps Woods Pkwy (Show on map)
Apr 20, 2026
Back
Security Engineer 2 - Cyber Security
#51-8943
Multiple Locations
Apply
X Facebook LinkedIn Email Copy
Location

This position is 100% remote within the Bank's footprint. Employee will work full time remote outside of a WesBanco location (may occasionally attend in person meetings, although primary functions of the role are performed remotely)

Market
Wheeling
Work Hours per Week
37.5
Requirements

Bachelor's degree in Information Security or other computer-related field, and four years of related experience; or equivalent combination of education and/or experience.


Professional level knowledge of common network protocols utilized on corporate networks.


Professional level knowledge of at least three of the following technologies: Networking infrastructure products (routers, switches, wireless), Windows Operating Systems, Security infrastructure products (firewalls, intrusion prevention systems, content filtering), Virtualized infrastructure (Citrix, VMware, Nutanix), Cloud administration and security (Azure, AWS - Amazon Web Services) required.


Experience in an environment with change management processes.


Experience with cloud administration and security in Azure and/or AWS is preferred.

Job Description

SUMMARY:


This position is responsible for design, planning, and implementation of in-house and cloud-based information systems, and enterprise software architectures that support the bank's information security operations functions. This role performs feedback and recommendation in the evaluation and selection of technologies, ensuring confidentiality, integrity, availability of data, and alignment with the standards of the bank. The position serves as a technical resource for security engineering initiatives, applying advanced knowledge to evaluate, build, and deliver solutions that enhance the security posture of the organization.



ESSENTIAL DUTIES AND RESPONSIBILITIES:


To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skills, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.


Engineers and implements new security designs and solutions and report to Information Technology security management.


Architects, engineers, and deploys advanced security solutions across the enterprise, providing expert-level guidance and reporting outcomes to Information Technology security leadership.


Assists Security Analysts as an escalation point for security alerts, events, and logs, escalating findings appropriately to senior management.


Designs, implements, and optimizes technical controls to mitigate vulnerabilities, leveraging both existing and emerging security technologies.


Recommends and tests system hardening standards for new and existing network attached platforms and applications, ensuring compliance through structured assessments and detailed reporting.


Oversees lifecycle management for security platforms and infrastructure, including advanced configuration, troubleshooting, optimization, and update deployment for security technologies and supporting systems.


Contributes to the development, enhancement, and enforcement of enterprise security policies, standards, and procedures, ensuring alignment with industry best practices and regulatory requirements.


Produces advanced technical and executive-level reports detailing assessment outcomes, risk findings, security posture, and recommended remediation strategies.


Leads tuning, configuration optimization, and policy enhancements for critical security platforms-including firewalls, IPS/IDS, hostbased firewalls, application control technologies, and SIEM platforms-in collaboration with respective IT teams.


Delivers ongoing reporting and analysis to Information Technology security leadership regarding enterprise security posture, threat trends, and control effectiveness.


Performs advanced monitoring, analysis, and tracking of application and system vulnerabilities; validate severity, prioritize risk, and guide remediation planning in conjunction with Threat Intelligence and respective IT teams.


Tracks, analyzes, and reports on enterprise patch and configuration compliance, identifying gaps and working with Threat Intelligence and system owners to drive remediation and continuous improvement.



OTHER REQUIREMENTS:


Banking is a highly regulated industry and you will be expected to acquire and maintain a proficiency in the Bank's policies and procedures, and adhere to all laws, rules and regulations that are applicable to your conduct and the work you will be performing. You will also be expected to complete all assigned compliance training in a timely manner.


Ability to read, analyze and interpret general business periodicals, professional journals, technical procedures or governmental regulations.


Ability to write reports, business correspondence and procedure manuals.


Ability to effectively present information and respond to questions from groups of managers, clients, customers and the general public.


Ability to work with mathematical concepts such as probability and statistical inference, fundamentals of plane and solid geometry and trigonometry.


Ability to apply concepts such as fractions, percentages, ratios and proportions to practical situations.


Ability to solve practical problems and deal with a variety of concrete variables in situations where only limited standardization exists.


Ability to interpret a variety of instructions furnished in written, oral, diagram or schedule form.


Advanced level of knowledge and understanding of networking and communication technologies, including TCP/IP protocol, remote access methods, firewalls and wireless protocols.


Experience with end-point security best practices leveraging NIST, CIS or Microsoft standards preferred.


Certifications related to system architecture, design, and administration (Microsoft, Cisco, Vmware) are preferred.


Certifications related to security operations (EC-Council, CompTIA) are a plus.

Full-Time/Part-Time
Full-time
Area of Interest
Information Technology
All Locations
Uniontown , Ohio , United States
Ann Arbor , Michigan , United States
Cincinnati , Ohio , United States
Columbus , Ohio , United States
Defiance , Ohio , United States
Fairmont , West Virginia , United States
Findlay , Ohio , United States
Fort Wayne , Indiana , United States
Frankfort , Kentucky , United States
Huntington , West Virginia , United States
Indianapolis , Indiana , United States
Ironton , Ohio , United States
New Albany , Indiana , United States
Parkersburg , West Virginia , United States
Pittsburgh , Pennsylvania , United States
Toledo , Ohio , United States
Wheeling , West Virginia , United States
Youngstown , Ohio , United States
Chattanooga , Tennessee , United States
Franklin , Tennessee , United States
Knoxville , Tennessee , United States
Show more
Applied = 0

(web-bd9584865-8jwgc)