ROLE
|
IT Security Engineer
|
LOCATION
|
Dimondale MI
|
DURATION
|
LONG TERM
|
RATE
|
DOE
|
DIRECT CLIENT
|
YES
|
INTERVIEW TYPE
|
In-Person Only
|
Local candidates
strongly preferred
ALL candidates MUST be able
to attend a personal interview, NO phone interviews, NO Skype, NO exceptions
|
|
State Experience Highly
Preferred
U.S. Citizens and those
authorized to work in the U.S. are encouraged to apply
Note: For H1 While
submitting I need consultant I 797 OR ID Proof.
|
|
Years of Experience
3+ years of experience in
security architecture
9+ years of experience in
information security
9+ years of experience working
with computer systems
9+ years of experience working
with network software and hardware, data or voice as well as experience with
open and proprietary software and hardware
Job Description
Establish the target
security/infrastructure architecture. Author corresponding requirements,
including definition of dependencies on infrastructure consolidation
efforts. Define Security/Information Assurance requirements (and
dependencies). Specify key architectural aspects of the architecture
view, and identify other aspects that need definition. Other duties
include researching best practices for reuse, applying State IT Security and
industry standards, and defining the transformation approach that transitions
the current architecture to the target architecture.
Experience working with current
and emerging information security technologies and development methodologies.
Bachelor’s degree in computer science, management information systems, or
related field preferred. Good analytical and creative problem solving
skills.
Relies on experience and
judgment to plan and accomplish goals, independently performs a variety of
complicated tasks, a wide degree of creativity and latitude is expected.
Additional Requirements
Engineer, implement and monitor
security measures for the protection of computer systems, networks and
information
Identify and define system
security requirements
Design computer security
architecture and develop detailed cyber security designs
Prepare and document standard
operating procedures and protocols
Configure and troubleshoot
security infrastructure devices
Develop technical solutions and
new security tools to help mitigate security vulnerabilities and automate
repeatable tasks
Ensure that the company knows
as much as possible, as quickly as possible about security incidents
Write comprehensive reports
including assessment-based findings, outcomes and propositions for further
system security enhancement
|
Skills
|
Required
|
Years Used
|
Last Used
|
Proven work experience as a system security
engineer or information security engineer
|
5 Years
|
|
|
Experience in building and maintaining
security systems
|
5 Years
|
|
|
Cyber Security Related Certification (CISSP
or Related)
|
5 Years
|
|
|
BS degree in Computer Science or related
field
|
5 Years
|
|
|
Experience working in highly complex
Information Technology environments (large company or government)
|
10 Years
|
|
|
Experience in a system administration role
supporting multiple platforms and applications
|
5 Years
|
|
|
Experience with network security and
networking technologies and with system, security, and network monitoring
tools
|
5 Years
|
|
|
Hands on experience in security systems,
including firewalls, intrusion detection systems, anti-virus software,
authentication systems, log management
|
5 Years
|
|
|
Experience designing secure networks,
systems and application architectures
|
5 Years
|
|
|
Experience planning, researching and
developing security policies, standards and procedures
|
5 Years
|
|
|
Thorough understanding of the latest
security principles, techniques, and protocols
|
5 Years
|
|
|
Detailed technical knowledge of database
and operating system security
|
5 Years
|
|
|
Familiarity with web related technologies
(Web applications, Web Services, Service Oriented Architectures) and of
network/web related protocols
|
5 Years
|
|
|
Knowledge of risk assessment tools,
technologies and methods
|
5 Years
|
|
|
Ability to communicate network security
issues to peers and management
|
5 Years
|
|
|
Ability to read and use the results of
mobile code, malicious code, and anti-virus software
|
5 Years
|
|
|
Knowledge of disaster recovery, computer
forensic tools, technologies and methods
|
5 Years
|
|
|
No comments:
Post a Comment