Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailNot Disclosed
Salary Not Disclosed
1 Vacancy
Leads the development and delivery of IT security standards best practices architecture and systems to ensure information system security across the enterprise.
An advanced-level security professional participates in advanced information security related projects performs deep-dive threat hunting incident response vulnerability management and security architecture design focusing on complex and novel threats that bypass automated systems. Is trained and experienced in meeting security needs of the agency and its employees in multiple locations and ensure people processes and technology aligns with the desired security posture of the organization. This role typically requires extensive experience advanced skills in threat detection and mitigation and may involve developing and optimizing security tools and processes. Cybersecurity Specialist 3 may serve as lead worker for projects and team.
Entry Qualifications
Bachelors degree in Computer Science/Information Technology/Information Security or related field or equivalent experience and four (4) years of proven experience and demonstrated success in technology leadership with emphasis on information security and data governance.
Key Responsibilities:
Advanced Threat Hunting:
Proactively search for sophisticated covert threats that evade automated detection.
Possess a deep understanding of cybersecurity threats vulnerabilities security frameworks and monitoring tools.
Complex Incident Response:
Investigate triage and respond to security incidents documenting findings for root cause analysis.
Vulnerability Assessment:
Conduct in-depth vulnerability assessments and analyze asset discovery data to identify security gaps.
Security Architecture:
Design and implement security solutions often involving threat intelligence platforms and other advanced security technologies.
System Monitoring & Response:
Tool Optimization:
Evaluate and optimize existing cybersecurity tools such as SIEM EDR and IDS and recommend new technologies or processes.
Threat Intelligence Integration:
Integrate various threat intelligence feeds into platforms like MISP to enhance detection capabilities.
Skills and Competencies:
Deep Technical Expertise:
Vulnerability Management:
Threat Intelligence:
Incident Response (IR):
Proactive Defense:
Required Skills : C#
Basic Qualification :
Additional Skills :
This is a high PRIORITY requisition. This is a PROACTIVE requisition
Background Check : No
Drug Screen : No
Full-time