Technical Support Engineer II at Fenix24
Remote, Oregon, USA -
Full Time


Start Date

Immediate

Expiry Date

08 Dec, 25

Salary

0.0

Posted On

08 Sep, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Macos, Scripting, Microsoft, Computer Science, Giac, Information Technology, Cisco, Operating Systems, Managed Services, Linux Distributions, Optimization, Firewalls, Network Architecture, Communication Skills

Industry

Information Technology/IT

Description

Fenix24 is an industry-leading cyber disaster recovery and restoration company. Battling threat actors as The World’s First Civilian Cybersecurity Force, Fenix24 delivers cybersecurity services through its four battalions: Fenix24 for ransomware recovery and restoration; Athena7 for IT security assessments, strategy and planning; Grypho5 for ongoing security-based management; and Argos99 for expert insights into data, assets and infrastructure. Under its Securitas Summa program, Fenix24 ensures organizations are prepared to effectively resist and rapidly recover from a cyberattack, offering a combination of managed data and infrastructure protection, real-time threat intelligence, and ongoing hardening and breach resistance.
Grypho5 is a “battalion” within Chattanooga, Tennessee-based Fenix24 — The World’s First Civilian Cybersecurity Force. Grypho5 specializes in comprehensive, security-based managed solutions using real-time, proprietary threat intelligence to ensure an organization’s defenses are prepared to effectively resist and rapidly recover from a cyberattack.

PREFERRED SKILLS

  • Demonstrated proficiency in RMM tools (Auvik, N-central, IT Glue) and automation/policy configuration
  • Advanced experience with ConnectWise Manage/PSA or similar ITSM platforms
  • Strong working knowledge of operating systems
  • Windows Server/Desktop, Linux distributions, macOS
  • Solid understanding of network architecture, protocols, and security technologies
  • Firewalls, VPNs, VLANs, DNS, etc.
  • Experience using and interpreting data from EDR/IDR tools such as CrowdStrike, eSentire, or Arctic Wolf
  • Ability to analyze logs, conduct packet captures, and use scripting or command-line tools for advanced troubleshooting
  • Excellent communication skills, including mentoring junior team members and presenting findings to internal stakeholders

QUALIFICATIONS

  • Bachelor’s degree in computer science, cybersecurity, or information technology
  • Or equivalent experience
  • Three-to-five years of technical support or systems administration experience in a managed services or enterprise environment
  • Industry certifications such as CompTIA Security+, CySA+, Network+, or equivalent
  • For example: GIAC, Cisco, Microsoft
  • Proven experience supporting secure, compliance-sensitive environments
  • For example: HIPAA, FERPA, CJIS, or ISO frameworks
  • Demonstrated history of independently resolving complex issues and contributing to process optimization
Responsibilities
  • Serve as an escalation point for Tier I engineers, taking ownership of advanced technical issues involving endpoint security, network configuration, and infrastructure monitoring
  • Analyze security alerts and perform root-cause analysis on recurring incidents to identify and recommend long-term solutions
  • Act as a liaison between support and engineering teams to document and escalate software bugs or product performance issues
  • Maintain deep operational awareness of client environments, and proactively identify opportunities to improve stability and security posture
  • Contribute to continuous improvement of the support knowledge base, ticketing workflows, and automation scripts
  • Participate in the regular on-call rotation
  • Occasionally participate in major-incident response efforts
  • Ensure all client communications meet Grypho5’s standards for clarity, empathy, professionalism, and response times
  • Provide input into customer success initiatives, including onboarding, postmortems, and ongoing risk assessments
  • Stay current with emerging threats, tools, and technologies in the cybersecurity industry
Loading...