Job ID :
13180
Company :
State Of Michigan
Location :
DIMONDALE, MI
Type :
Contract
Duration :
Around a Year
Salary :
Open
Status :
Active
Openings :
1
Posted :
22 May 2018
Job Seekers, Please send resumes to resumes@hireitpeople.com
Short Description: 

Establish the target security/infrastructure architecture.

Complete Description:  

Years of Experience:
  • 3+ years of experience in security architecture
  • 9+ years of experience in information security
  • 9+ years of experience working with computer systems
  • 9+ years of experience working with network software and hardware, data or voice as well as experience with open and proprietary software and hardware
Job Description:

Establish the target security/infrastructure architecture. Author corresponding requirements, including definition of dependencies on infrastructure consolidation efforts.  Define Security/Information Assurance requirements (and dependencies).  Specify key architectural aspects of the architecture view, and identify other aspects that need definition.  Other duties include researching best practices for reuse, applying State IT Security and industry standards, and defining the transformation approach that transitions the current architecture to the target architecture.

Experience working with current and emerging information security technologies and development methodologies. Bachelor’s degree in computer science, management information systems, or related field preferred.  Good analytical and creative problem solving skills.

Relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, a wide degree of creativity and latitude is expected.

Additional Requirements:
  • Engineer, implement and monitor security measures for the protection of computer systems, networks and information
  • Identify and define system security requirements
  • Design computer security architecture and develop detailed cyber security designs
  • Prepare and document standard operating procedures and protocols
  • Configure and troubleshoot security infrastructure devices
  • Develop technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks
  • Ensure that the company knows as much as possible, as quickly as possible about security incidents
  • Write comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement.
Skill
Required / Desired
Amount
of Experience
Proven work experience as a system security engineer or information security engineer
Required
5
Years
Experience in building and maintaining security systems
Required
5
Years
Cyber Security Related Certification (CISSP or Related)
Highly desired
5
Years
BS degree in Computer Science or related field
Highly desired
5
Years
Experience working in highly complex Information Technology environments (large company or government)
Required
10
Years
Experience in a system administration role supporting multiple platforms and applications
Required
5
Years
Experience with network security and networking technologies and with system, security, and network monitoring tools
Required
5
Years
Hands on experience in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management
Required
5
Years
Experience designing secure networks, systems and application architectures
Required
5
Years
Experience planning, researching and developing security policies, standards and procedures
Highly desired
5
Years
Thorough understanding of the latest security principles, techniques, and protocols
Required
5
Years
Detailed technical knowledge of database and operating system security
Required
5
Years
Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocols
Highly desired
5
Years
Knowledge of risk assessment tools, technologies and methods
Nice to have
5
Years
Ability to communicate network security issues to peers and management
Required
5
Years
Ability to read and use the results of mobile code, malicious code, and anti-virus software
Desired
5
Years
Knowledge of disaster recovery, computer forensic tools, technologies and methods
Desired
5
Years