IT Services
Contract
United States
Norfolk
Needed
NCIA
EXPERIENCE AND EDUCATION:
Essential Qualifications/Experience:
· Secondary educational qualification with 4 years post-related experience
· 4+ years practical experience of implementation and maintenance of cyber security systems within a large organization
· Working experience administrating and monitoring cyber security software
· Good understanding of cyber security systems and the ability to work independently to solve problems
· Working experience troubleshooting technical issues and providing technical support to end-users
Desirable Qualifications/Experience:
· Security Professional certification (CEH, GIAC, ISC2, or other relevant certification)
DUTIES/ROLE:
· Information security
ü Applies and maintains specific security measures as required by organisational policy and local risk assessments
ü Contributes to the identification of risks that arise from potential technical solution architectures
ü Suggests alternate solutions or countermeasures to mitigate risks
ü Defines secure systems configurations in compliance with intended architectures
ü Supports investigation of suspected attacks and security breaches
· Information assurance
ü Follows standard approaches for the technical assessment of information systems against information assurance policies and business objectives
ü Makes routine accreditation decisions
ü Recognises decisions that are beyond their scope and responsibility level and escalates according
ü Reviews and performs risk assessments and risk treatment plans
ü Identifies typical risk indicators and explains prevention measures
ü Maintains integrity of records to support and justify decisions
· IT infrastructure
ü Carries out routine operational procedures, including the execution of specified automation tools/scripts
ü Contributes to maintenance and installation
ü Monitors and reports on infrastructure performance to enable service delivery
ü Resolves issues or refers to others for assistance
· Vulnerability assessment
ü Undertakes low-complexity routine vulnerability assessments using automated and semi-automated tools
ü Escalates issues where appropriate
ü Contributes to documenting the scope and evaluating the results of vulnerability assessments
· Information Security Administration
ü Works with access controls for firewalls and endpoint security solutions
ü Assists in the operation of day-to-day administrative transactions and systems
ü Performs periodic system backups and produces standard monitoring reports
ü Coordinates user access and maintains security checklists and authorization tables
ü Tests the effectiveness of new or revised information security procedures and tools
· Information Technology (IT) Security Policies
ü Performs information gathering and research on key elements of IT security policies
ü Assists senior colleagues in identifying and analysing critical issues in IT security policies
ü Executes IT security policies and standards within a specific region in organization
ü Conducts performance reviews on implementation of IT security policies
ü Generates status reports for senior management to ensure the implementation of IT security policies
All the mandatory requirements have to be met in order to apply.