Completing day-to-day management and operations of assigned security solutions and platforms to help detect security vulnerabilities and events which pose risk to the enterprise.
Continuously assessing existing processes and procedures for improvement opportunities.
Recommending and executing proactive security tool configuration updates to strengthen the organization’s overall security posture and streamline existing processes, based on the evolving cyber threat landscape.
Requirements
Bachelors Degree and 7 years of combined IT and security work experience with a broad exposure to infrastructure/network and multi-platform environments OR 11 years of combined IT and security work experience with a broad exposure to infrastructure/network and multi-platform environments OR 11 years relevant military experience.
Requires knowledge of security issues, techniques, and implications across all existing computer platforms.
Strong oral & written communication skills
Problem solving / analytical skills, tools, and techniques.
Results-oriented, continuous improvement mindset
Organization and multi-tasking skills; ability to manage multiple projects and tasks
Ability to operate effectively under high pressure situations and/or against deadlines
Ability to prioritize and make trade-off decisions.
Understanding of information security frameworks, incident management/response, security operations, and application security best practices
Ability to support Incident Response (gathering evidence from logs, etc.)
Experience with security team operations in complex technical environments
Ability to learn and adapt to new technologies and processes
Knowledge of emerging technologies
Experience with system and technology integration for various security technologies
IT standards, procedures, and policies (e.g., HIPAA)
Certificate & Key Mgmt.
Configuration Mgmt.
TVM Scanning
Patch Mgmt.
Wireless Security
SSO and IdM tooling and functionality
Security event monitoring systems
Network-based and host-based intrusion detection systems
Firewall technologies
Malware detection
Enterprise-level antivirus solutions/systems and encryptions standards