Job Description:
Responsibilities :
- Assess complex IT environments and map the data flow through systems applications and functions
- Assess the current architecture and solution limitations and define and design system specifications and working parameters for new solutions
- Develop and deploy incident response plans and cybersecurity procedures
- Design build implement and support enterprise-class information security systems
- Plan research and design robust security architectures for assigned IT projects
- Perform security assessments including security program reviews penetration testing vulnerability testing and risk analysis
- Identify IT security design gaps and define proposed changes or enhancements
- Design action plans for policy creation and governance system hardening monitoring incident response disaster recovery and emerging cybersecurity threats
- Research plan evaluate and engineer security technology products and solutions
- Define and maintain security policies and procedures aligned to industry best practices
- Manage large-scale programs
- Review and recommend security configuration and policies for firewalls VPN systems routers IDS scanning technologies and servers
- Review and analyze system logs SIEM tools and network traffic for unusual or suspicious activity
- Test new security software tools and technology to determine their best use within our organization
- Provide security architecture and engineering expertise across company projects and initiatives
- Provide Tier-2 support to cybersecurity staff in response to security-related incidents
- Identify and communicate current and emerging IT security threats
Skills and Experience :
- Experience in a cybersecurity role
- Experience in security design or technical evaluation
- Experience in security operations management incident management and governance
- Experience designing and implementing technical solutions for network security including firewall proxy services VPN/remote access intrusion detection and prevention and software-defined network security
- Experience with security protocols including SSL HTTPS SSH PGP PKI and/or Kerberos
- Experience with system orchestration and control infrastructure elements API integration frameworks Openstack or similar system control environments
- Experience developing technical evaluation plans and technical reports
- Knowledge of vulnerability scanners and interpreting results
- Knowledge of manual configuration review for different operating systems and database servers based on the CIS benchmarks
- Knowledge of database and operating system security
- Knowledge of common security standards and frameworks
Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services such as false websites or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process nor ask a job seeker to purchase IT or other equipment on our information on employment scams is availablehere.