drjobs PL-Cybersecurity Engineer 4 Senior Security Operations Engineer

PL-Cybersecurity Engineer 4 Senior Security Operations Engineer

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Richmond - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

VDOT is seeking an experienced Senior Security Operations Engineer with in-depth knowledge and hands on experience in the areas of security policy intrusion detection/prevention systems perimeter security Technology and Information security.

Job Overview:

VDOT is seeking an experienced Senior Security Operations Engineer with in-depth knowledge and hands on experience in the areas of Information Systems security security policy intrusion detection/prevention systems firewalls anti-virus software anti-malware anti-phishing authentication systems log analysis and management web content filtering; network protocols and security/authentication protocols at all layers of the OSI model with emphasis on TCP/IP web security gateways network access control endpoint security and perimeter security technologies. The Senior Security Operations Engineer contributes to the overall technology roadmap.

Key Responsibilities:
Participates in the design implementation and support of security infrastructure for the Department.
Identifies network and information security risks across the enterprise design engineer implement security solutions to address the risks at an enterprise level.
Works closely with the IT Division and outside vendors to effectively design plan deploy secure and update network projects in the environment.
Effective collaboration with the Office of Information Security OIS and other ITD groups is maintained.
Strategic Plan items pertinent to the Network Security Operations group are completed.
System policies and procedures are created documented and maintained.
Perform network scans and penetration testing. Monitors log analysis and management tools for threats.
Evaluate vulnerability scan results and notify business application and infrastructure teams of vulnerabilities in need of remediation.
Evaluate and participate in agency Azure cloud solution review of network security and general project involvement.
Ensure all daily functions that are required to maintain security applicable systems and applications are documented.
Work with the agencys ISO team and the IT Auditors to review security audit findings and vulnerability scans results. Identify recommended correction activities and course of action once determined communicate with the various stakeholders.
Device configurations are based on best practices.
Relevant documentation is kept up to date.
Coordinating the handling and resolution of incidents related to security.

Required Skills & Qualifications:

Required / Desired / Preferred

Considerable knowledge and hands on experience in the areas of information systems security of security policy

7 Years

Required

Considerable knowledge and hands on experience with firewalls anti-virus software anti-malware anti-phishing authentication systems.

7 Years

Required

Considerable knowledge and experience with network protocols and security/authentication protocols at all layers of the OSI model with emphasis on TCP/IP

7 Years

Required

Considerable knowledge and hands on experience detecting responding remediating security incidents.

7 Years

Required

Solid experience with performing threat; vulnerability and risk assessment; and coordinating the handling and resolution of incidents related to security breaches at an enterprise level required.

7 Years

Required

CISSP

N/A

Required/Desired Skills Skill Required /Desired Amount of Exp in yrs Consultant Experience Consultant Last Used Considerable knowledge and hands on experience in the areas of information systems security of security policy Required 7 Considerable knowledge hands on experience with web security gateways network access control endpoint security and perimeter security technologies. Required 7 Considerable knowledge and hands on experience with firewalls anti-virus software anti-malware anti-phishing authentication systems. Required 7 Considerable knowledge and hands on experience with intrusion detection/prevention systems log analysis and management web content filtering Required 7 Considerable knowledge and experience with network protocols and security/authentication protocols at all layers of OSI model with emphasis on TCP/IP Required 7 Demonstrated ability to identify security risks across the enterprise and perform the day-to-day operation. Required 7 Demonstrated ability to administer and protect the integrity confidentiality and availability of information assets and technology infrastructure Required 7 Considerable knowledge and hands on experience detecting responding remediating security incidents. Required 7 Considerable knowledge and hands on experience remediating System Security Plans (SSP) and Risk Assessment (RA) in cybersecurity Required 7 Solid experience with performing threat; vulnerability risk assessment and coordinating the resolution of incidents related to security breaches. Required 7 Considerable knowledge and hands on experience with web related technologies and penetration testing tools Required 7 CISSP Highly desired 0 Questions No. Question Consultant Answer Question1 Commonwealth of Virginia security policies prohibit the use of offshore IT contractors. Do you attest to the fact that your candidate will physically reside within the US for the duration of the assignment Question2 Please list candidates email address.

Employment Type

Full-time

Company Industry

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.