Listing Description
Oversee and provide Tier 2 and Tier 3 normal business hour and after-hours support
Supports and mentors junior team members
Collects and analyzes requirements for security projects and provides project estimates
Reevaluates existing security tools and documents security enhancements and procedures to mitigate risks; ensure documentation from team members meets quality standards
Manages multiple enhancements or other project efforts, providing timeline, budget and estimates for work, tracking and escalating issues, defining risks and ensuring integration between various systems
Ensures existing security tools meet performance requirements
Remains current with new security vulnerabilities and key technologies and recommends changes or actions to management as appropriate
Maintains expertise to function as subject matter expert in multiple technical and business disciplines; serves as security consultant for investment projects and troubleshooting efforts
Serves as an advocate for secure computing practices and procedures, communicating Information Security best practices throughout the company
Develops strong partnerships with business clients, network and technology partners, vendors and other technical resources
Reviews project requirements documents
Reviews test-related documentation
Creates and maintains security standards documentation
This position requires broad IT background, expertise in Information Security, strong familiarity with host based security technologies, comprehensive knowledge of network and infrastructure, and strong analytical, and communication skills.Qualifications:
Bachelors or degree in Information Technology ( or a related discipline) or relevant work experience
8+ years of information security experience with advanced knowledge in multiple areas including SOC operations, Antivirus, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), File Integrity Monitoring and Vulnerability Assessment.
8+ years of Information Technology experience including hardware, networking, architecture, protocols, file systems and operating systems
Experience designing, recommending and architecting complex security solutions.
Fundamental understanding of application protocols (HTTP, DNS, FTP, etc.) and networking protocols (TCP, UDP, ARP, ICMP, etc.)
Proficiency in a Linux command line environment (awk, sed, grep, etc.) or Windows equivalent (Powershell) to analyze log files and locate anomalies.
Substantial combination of relevant education, training, and experience in the Cyber Intelligence discipline
Proficiency scripting solutions using (Perl, Python, BASH, etc.)
Experience delivering complex projects to successful completion
Experience documenting logical and physical architectures with Visio
Experience with the creation of test plans and testing.
8+ years supporting either Symantec AV, McAfee ePO or Tripwire
Listing Details
- Citizenship: No Requirements
- Incentives: Not Provided
- Education: No Requirements
- Travel: No Travel
- Telework: No Telecommute