drjobs GA DOR - Cybersecurity Specialist 3

GA DOR - Cybersecurity Specialist 3

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Atlanta, GA - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Leads the development and delivery of IT security standards best practices architecture and systems to ensure information system security across the enterprise.

*Candidate MUST be local to Metro Atlanta*

**US Citizen or GC-Permanent Resident**
*Tax Clearance Letter due at the time of submission* (pls review compliance tab for instruction on how the CANDIDATE must obtain this letter)

Job Summary:

An advanced-level security professional participates in advanced information security related projects performs deep-dive threat hunting incident response vulnerability management and security architecture design focusing on complex and novel threats that bypass automated systems. Is trained and experienced in meeting security needs of the agency and its employees in multiple locations and ensure people processes and technology aligns with the desired security posture of the organization. This role typically requires extensive experience advanced skills in threat detection and mitigation and may involve developing and optimizing security tools and processes. Cybersecurity Specialist 3 may serve as lead worker for projects and team.

Entry Qualifications

Bachelors degree in Computer Science/Information Technology/Information Security or related field or equivalent experience and four (4) years of proven experience and demonstrated success in technology leadership with emphasis on information security and data governance.

Key Responsibilities:

Advanced Threat Hunting:

Proactively search for sophisticated covert threats that evade automated detection.

Possess a deep understanding of cybersecurity threats vulnerabilities security frameworks and monitoring tools.

Complex Incident Response:

Investigate triage and respond to security incidents documenting findings for root cause analysis.

Vulnerability Assessment:

Conduct in-depth vulnerability assessments and analyze asset discovery data to identify security gaps.

Security Architecture:

Design and implement security solutions often involving threat intelligence platforms and other advanced security technologies.

System Monitoring & Response:

Actively monitor networks for unauthorized activities and respond to security incidents.

Tool Optimization:

Evaluate and optimize existing cybersecurity tools such as SIEM EDR and IDS and recommend new technologies or processes.

Threat Intelligence Integration:

Integrate various threat intelligence feeds into platforms like MISP to enhance detection capabilities.

Skills and Competencies:

Deep Technical Expertise:

Mastery of intrusion detection systems (IDS) endpoint detection and response (EDR) and security information and event management (SIEM) platforms.

High-level proficiency in computer science and information systems network monitoring and security software.

Vulnerability Management:

Experience and skills with vulnerability assessment tools and techniques.

Threat Intelligence:

The ability to gather integrate and analyze threat intelligence from various sources.

Incident Response (IR):

In-depth knowledge of IR best practices and the ability to manage complex incidents.

Proactive Defense:

A mindset focused on proactive threat hunting and prevention rather than just reaction.

Working Conditions:

  • Hybrid work schedule.
  • On-call rotation or occasional after-hours work in response to incidents.

    DOR will conduct a background check on all candidates considered for the position. Individuals must be compliant with Georgia tax obligations.

    Individuals having any overdue and unpaid taxes or any felony convictions (no matter how long ago) will not be offered the position or hired.

    All employees will be fingerprinted.

Required/Desired Skills Skill Required /Desired Amount of Experience Bachelors degree in computer science/information technology/information security or related field or equivalent experience Required 0 Experience and demonstrated success in technology leadership with emphasis on information security and data governance Required 4 Years Experience with cybersecurity tools such as SIEM EDR and IDS Required 4 Years Questions No. Question Question1 Absences greater than two weeks MUST be approved by CAI management in advance and contact information must be provided to CAI so that the resource can be reached during his or her absence. The Client has the right to dismiss the resource if he or she does not return to work by the agreed upon date. Do you agree to this requirement Question2 What is your candidates email address Question3 If selected for engagement your candidates hourly Pay Rate must be at least $45.00 Your candidate can be paid more; however the hourly SRP Rate cannot exceed $60.75 Do you agree to these requirements Question4 The maximum mark-up for this engagements SRP rate is 35%. To be competitive on pricing a mark-up below the 35% threshold is suggested. Do you agree to propose a mark-up at or below 35% Question5 This assignment is contingent upon customer renewal and availability of adequate funding. Do you agree to this requirement Question6 If selected for engagement your candidate will be expected to start no later than 2 weeks (10 business days) after the clients selection date Do you agree to this requirement Question7 Where does the candidate currently reside Question8 HYBRID work option: However the selected candidate must be available to report onsite as directed by the client. Do you accept this requirement Question9 Is the candidate a US Citizen or GC-Permanent Resident

Employment Type

Full-time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.