Selection Criteria: |
Proven experience on both Linux-based and MS Windows-based system platforms with a strong IT technical understanding and aptitude for analytical problem-solving. Experience using SSH to maintain and configure systems remotely. Demonstrated strong understanding of enterprise, network, system and application-level security issues. Proven experience with system hardening processes, tools, guidelines and benchmarks. Proven understanding of the current vulnerabilities, response and mitigation strategies used in cyber security. Demonstrated strong team player – collaborates well with others to solve problems and actively incorporates input from various sources. Proven experience leading and motivating team members toward excellence and project completion. Demonstrated customer focus – evaluates decisions through the eyes of the customer, builds strong customer relationships and creates processes with customer viewpoint. Demonstrated analytical skills – continuously defines problems, collects or interprets data, establishes facts, anticipates obstacles and develops plans to resolve; strong problem-solving skills while communicating in a clear and succinct manner effectively evaluating information/data to make decisions. Demonstrated inherent passion for information security and service excellence. Proven excellent verbal and written communication skills; frequently expresses, exchanges or prepares accurate information to internal and external customers in a clear, focused and concise manner. Conforms to proper rules of punctuation, grammar, diction and style. Demonstrated self-starter with strong internal motivation. Proven ability to work with little supervision or direction. Proven ability to work under multiple deadlines with minimal supervision. Must cite examples of successfully organizing and effectively completing projects where given little or no direction. Demonstrated ability to continually perform an activity such as preparing and visualizing data and figures, transcribing, viewing a computer terminal or extensive reading. Visual acuity is required to determine accuracy, neatness and thoroughness of work assigned. Ability to continuously make repetitive motions of the wrists, hands and/or fingers.
|
Work Setting: |
This position works in an office setting and remains in a stationary position for long periods of time while working at a desk, on a computer or with other standard office equipment, or while in meetings.
|
Educational Requirements: |
Bachelor’s degree in computer science, computer engineering, IT or a related technical field, or commensurate selection criteria experience.
|
Computer Skills and Knowledge of Hardware & Software Required: |
Linux-based and MS Windows-based system platforms. Strong understanding of Enterprise, network, system and application-level security issues. Understanding of Enterprise computing environments, systems, applications, and a strong understanding of TCP/IP networks. Fundamental or greater understanding of encryption technologies. Excellent scripting skills in the Python language. Familiarity with other scripting languages preferred (examples: Perl, Java, or Ruby).
Knowledge of Identity & Access Management practices, systems and controls. Project planning and execution experience highly desired.
Experience with security tools, including but not limited to IDS (snort or suricata preferred), IPS, data analytics software, SIEM solutions (QRadar preferred), WAF, knowledge base platforms and live response/forensics tools highly desired.
|
Certifications & Licenses (i.e., Series 6 & 63, CPA, etc.): |
Technical certifications highly desired (examples: CISCO Certifcations, Microsoft Certifications). Candidate encouraged to hold one or more of the following security certifications: Certified Information Systems Security Professional (CISSP), any GIAC certification or ISACA certifications.
|
Position Demands: |
|