Job Seekers, Please send resumes to resumes@hireitpeople.com
Short Description:
Establish the target security/infrastructure architecture.
Complete Description:
Years of Experience:
- 3+ years of experience in security architecture
- 9+ years of experience in information security
- 9+ years of experience working with computer systems
- 9+ years of experience working with network software and hardware, data or voice as well as experience with open and proprietary software and hardware
Job Description:
Establish the target security/infrastructure architecture. Author corresponding requirements, including definition of dependencies on infrastructure consolidation efforts. Define Security/Information Assurance requirements (and dependencies). Specify key architectural aspects of the architecture view, and identify other aspects that need definition. Other duties include researching best practices for reuse, applying State IT Security and industry standards, and defining the transformation approach that transitions the current architecture to the target architecture.
Experience working with current and emerging information security technologies and development methodologies. Bachelor’s degree in computer science, management information systems, or related field preferred. Good analytical and creative problem solving skills.
Relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, a wide degree of creativity and latitude is expected.
Additional Requirements:
- Engineer, implement and monitor security measures for the protection of computer systems, networks and information
- Identify and define system security requirements
- Design computer security architecture and develop detailed cyber security designs
- Prepare and document standard operating procedures and protocols
- Configure and troubleshoot security infrastructure devices
- Develop technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks
- Ensure that the company knows as much as possible, as quickly as possible about security incidents
- Write comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement.
Skill | Required / Desired | Amount | of Experience |
Proven work experience as a system security engineer or information security engineer | Required | 5 | Years |
Experience in building and maintaining security systems | Required | 5 | Years |
Cyber Security Related Certification (CISSP or Related) | Highly desired | 5 | Years |
BS degree in Computer Science or related field | Highly desired | 5 | Years |
Experience working in highly complex Information Technology environments (large company or government) | Required | 10 | Years |
Experience in a system administration role supporting multiple platforms and applications | Required | 5 | Years |
Experience with network security and networking technologies and with system, security, and network monitoring tools | Required | 5 | Years |
Hands on experience in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management | Required | 5 | Years |
Experience designing secure networks, systems and application architectures | Required | 5 | Years |
Experience planning, researching and developing security policies, standards and procedures | Highly desired | 5 | Years |
Thorough understanding of the latest security principles, techniques, and protocols | Required | 5 | Years |
Detailed technical knowledge of database and operating system security | Required | 5 | Years |
Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocols | Highly desired | 5 | Years |
Knowledge of risk assessment tools, technologies and methods | Nice to have | 5 | Years |
Ability to communicate network security issues to peers and management | Required | 5 | Years |
Ability to read and use the results of mobile code, malicious code, and anti-virus software | Desired | 5 | Years |
Knowledge of disaster recovery, computer forensic tools, technologies and methods | Desired | 5 | Years |