Requirements:
- Considerable knowledge and hands on experience in the areas of information systems security of security policy
- Considerable knowledge and hands on experience with web security gateways network access control endpoint security and perimeter security technologies.
- Considerable knowledge and hands on experience with firewalls anti-virus software anti-malware anti-phishing authentication systems.
- Considerable knowledge and hands on experience with intrusion detection/prevention systems log analysis and management web content filtering
- Considerable knowledge and experience with network protocols and security/authentication protocols at all layers of the OSI model with emphasis on TCP/IP
- Demonstrated ability to identify security risks across the enterprise and perform the day-to-day operation management and administration to protect the integrity confidentiality and availability of information assets and technology infrastructure.
- Considerable knowledge and hands on experience detecting responding remediating security incidents.
- Considerable knowledge and hands on experience remediating System Security Plans (SSP) and Risk Assessment (RA) in cybersecurity
- Solid experience with performing threat; vulnerability and risk assessment; and coordinating the handling and resolution of incidents related to security breaches at an enterprise level required.
- Considerable knowledge and hands on experience with web related technologies and penetration testing tools
- CISSP Certification required
Requirements: Considerable knowledge and hands on experience in the areas of information systems security of security policy Considerable knowledge and hands on experience with web security gateways network access control endpoint security and perimeter security technologies. Considerable knowledge...
Requirements:
- Considerable knowledge and hands on experience in the areas of information systems security of security policy
- Considerable knowledge and hands on experience with web security gateways network access control endpoint security and perimeter security technologies.
- Considerable knowledge and hands on experience with firewalls anti-virus software anti-malware anti-phishing authentication systems.
- Considerable knowledge and hands on experience with intrusion detection/prevention systems log analysis and management web content filtering
- Considerable knowledge and experience with network protocols and security/authentication protocols at all layers of the OSI model with emphasis on TCP/IP
- Demonstrated ability to identify security risks across the enterprise and perform the day-to-day operation management and administration to protect the integrity confidentiality and availability of information assets and technology infrastructure.
- Considerable knowledge and hands on experience detecting responding remediating security incidents.
- Considerable knowledge and hands on experience remediating System Security Plans (SSP) and Risk Assessment (RA) in cybersecurity
- Solid experience with performing threat; vulnerability and risk assessment; and coordinating the handling and resolution of incidents related to security breaches at an enterprise level required.
- Considerable knowledge and hands on experience with web related technologies and penetration testing tools
- CISSP Certification required
View more
View less