Engineer, Information Security
1. Auditing computer systems to ensure they are operating securely and that data is protected from both internal and external attack. This includes making recommendations to Chief Information Security Officer (CISO) for preventive measures as necessary.
2. Participating in audits as needed and directed by the agency.
3. Monitoring log management system (currently LogRhythm) for abnormalities and generating security incidents for suspicious traffic.
4. Creating and recommending security policies and procedures to the CISO.
5. Designing training materials, bulletins, notices, posters, etc. regarding computer security education and awareness for end-users.
6. Evaluating highly complex systems according to industry standards and best practices to safeguard information systems and databases.
7. Preparing reports on intrusions as necessary and providing analysis summary to management.
8. Defining and reviewing system security requirements to determine if they have been implemented in accordance with industry standards and best practices. This will include analyzing systems to determine system security status.
9. Leading investigations of security violations and breaches and recommending steps to mitigate these violations. This shall include assisting and/or providing direction to the staff.
10. Monitoring vulnerability risk alerts from manufacturers (i.e. Microsoft, Symantec, Sun, etc.) and escalating critical alerts to the CISO for immediate remediation.
11. Researching, testing, architecting, and implementing Identity Management (IDM), Single sign-on, Data Leak Prevention, and secure ID, and other solutions as requested by the TO Manager.
12. Configuring, customizing, monitoring, and managing existing security tools such as Symantec Antivirus, Computrace, WinMagic, and LogRhythm to optimize performance and/or reduce costs.
The candidate should have
• At least one (1) industry standard certification such as CISSP, CISA, CEH, or State approved equal.
• At least two (2) years’ implementing, configuring, and troubleshooting security systems such as Symantec End-point Protection, Computrace, WinMagic, LogRhythm, and/or IDM.
CATS+ Requirements:
• Duties: Analyzes and defines security requirements for information protection. Defines and develops security policies. Analyzes the sensitivity of information, performs vulnerability and risk assessments on the basis of defined sensitivity and information flow.
• Education: A Bachelor's Degree from an accredited college or university with a major in Computer Science, Information Systems, Engineering, Business, or other related scientific or technical discipline. A Master's Degree is preferred.
• General Experience: This position requires a minimum of eight (8) years of experience in information protection.
Specialized Experience: At least five (5) years of experience in defining security programs or processes for the protection of sensitive or classified information.
1. Auditing computer systems to ensure they are operating securely and that data is protected from both internal and external attack. This includes making recommendations to Chief Information Security Officer (CISO) for preventive measures as necessary.
2. Participating in audits as needed and directed by the agency.
3. Monitoring log management system (currently LogRhythm) for abnormalities and generating security incidents for suspicious traffic.
4. Creating and recommending security policies and procedures to the CISO.
5. Designing training materials, bulletins, notices, posters, etc. regarding computer security education and awareness for end-users.
6. Evaluating highly complex systems according to industry standards and best practices to safeguard information systems and databases.
7. Preparing reports on intrusions as necessary and providing analysis summary to management.
8. Defining and reviewing system security requirements to determine if they have been implemented in accordance with industry standards and best practices. This will include analyzing systems to determine system security status.
9. Leading investigations of security violations and breaches and recommending steps to mitigate these violations. This shall include assisting and/or providing direction to the staff.
10. Monitoring vulnerability risk alerts from manufacturers (i.e. Microsoft, Symantec, Sun, etc.) and escalating critical alerts to the CISO for immediate remediation.
11. Researching, testing, architecting, and implementing Identity Management (IDM), Single sign-on, Data Leak Prevention, and secure ID, and other solutions as requested by the TO Manager.
12. Configuring, customizing, monitoring, and managing existing security tools such as Symantec Antivirus, Computrace, WinMagic, and LogRhythm to optimize performance and/or reduce costs.
The candidate should have
• At least one (1) industry standard certification such as CISSP, CISA, CEH, or State approved equal.
• At least two (2) years’ implementing, configuring, and troubleshooting security systems such as Symantec End-point Protection, Computrace, WinMagic, LogRhythm, and/or IDM.
CATS+ Requirements:
• Duties: Analyzes and defines security requirements for information protection. Defines and develops security policies. Analyzes the sensitivity of information, performs vulnerability and risk assessments on the basis of defined sensitivity and information flow.
• Education: A Bachelor's Degree from an accredited college or university with a major in Computer Science, Information Systems, Engineering, Business, or other related scientific or technical discipline. A Master's Degree is preferred.
• General Experience: This position requires a minimum of eight (8) years of experience in information protection.
Specialized Experience: At least five (5) years of experience in defining security programs or processes for the protection of sensitive or classified information.