DAILY DUTIES / RESPONSIBILITIES:
PREFERENCE WILL BE GIVEN TO A CANDIDATE WHO CAN WORK ONSITE OVER HYBRID OVER FULL-TIME REMOTE (ON-SITE AS NEEDED).
IDENTITY AND ACCESS MANAGEMENT ENSURING THAT APPROPRIATE IDENTITY MANAGEMENT SINGLE SIGN ON MULTI-FACTOR AUTHENTICATION ACTIVE DIRECTORY AND APPLICATIONS ARE PROPERLY IMPLEMENTED AND CONFIGURED TO SUPPORT IT AND SECURITY OPERATIONS
RESPONSIBLE FOR AUTOMATION DEVELOPMENT AND IMPLEMENTATION OF DISPARATE SECURITY AND ENTERPRISE IT TOOLS
RESPONSIBLE FOR PLANNING DESIGNING DEVELOPMENT AND IMPLEMENTATION OF ENTERPRISE SECURITY SOLUTIONS THAT ALIGN WITH BUSINESS GOALS AND RISK TOLERANCE.
DESIGN DEPLOY AND MANAGE COUNTERMEASURES TO KNOWN SECURITY THREATS AND DEVELOP PREVENTATIVE MITIGATION STRATEGIES FOR NEW AND EMERGENT THREATS TO ENTERPRISE DATA NETWORKS AND ASSOCIATED SERVICES.
ENSURE VALIDATE AND MEASURE THE CONSISTENT APPLICATION OF PROTECTIVE MEASURES THROUGHOUT THE ENTERPRISE BUSINESS APPLICATION AND INFRASTRUCTURE SUPPORT ENVIRONMENTS. TAKE APPROPRIATE ACTION TO PROTECT STATE DATA AND TECHNOLOGY SERVICES.
REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
FIVE YEARS OF EXPERIENCE AND EXPERT UNDERSTANDING OF IDENTITY AND ACCESS CONTROL LOGGING AND REPORTING SYSTEMS
FIVE YEARS OF EXPERIENCE AND EXPERTISE IN AUTOMATION DEVELOPMENT USING TOOLS SUCH AS PYTHON AND BASH
CYBER SECURITY AWARENESS AND UNDERSTANDING
FIVE YEARS OF EXPERIENCE WITH LINUX WINDOWS NETWORK SECURITY PROTOCOLS AND PROCEDURES
FIVE YEARS OF EXPERIENCE IN SUPPORTING LARGE IT ENVIRONMENTS AND/OR SYSTEM DEPLOYMENTS PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
SIEM ANALYSIS AND REPORTING
SECURITY FRAMEWORKS: NIST CSF CJIS IRS 1075 CMS MARS-E
APPLICATION SECURITY (APPSEC)
REQUIRED EDUCATION/CERTIFICATIONS:
BACHELORS DEGREE IN AN INFORMATION TECHNOLOGY OR
INFORMATION SECURITY RELATED FIELD
EIGHT YEARS OF RELEVANT WORK
EXPERIENCE MAY BE SUBSTITUTED IN LIEU OF EDUCATION
PREFERRED EDUCATION/CERTIFICATIONS:
CISSP CISA CISO OR EQUIVALENT ADVANCED SECURITY CERTIFICATION.
ADDITIONAL RELEVANT CERTIFICATIONS (E.G. CEH OSCP GPEN).
VENDOR CERTIFICATIONS IN SIEM OR LOGGING TECHNOLOGIES.
INTERVIEW PROCESS (phone video or in-person how many rounds of i/vs etc)
INITIAL ROUND OF INTERVIEWS ON MICROSOFT TEAMS (ON CAMERA) WITH IN-PERSON INTERVIEWS
PREFERRED BEFORE FINAL SELECTION INTERVIEW AVAILABILITY: How soon can you schedule an interview (date / times)
ASAP after posting closes and resumes are received and reviewed
DAILY DUTIES / RESPONSIBILITIES: PREFERENCE WILL BE GIVEN TO A CANDIDATE WHO CAN WORK ONSITE OVER HYBRID OVER FULL-TIME REMOTE (ON-SITE AS NEEDED). IDENTITY AND ACCESS MANAGEMENT ENSURING THAT APPROPRIATE IDENTITY MANAGEMENT SINGLE SIGN ON MULTI-FACTOR AUTHENTICATION ACTIVE DIRECTORY AND AP...
DAILY DUTIES / RESPONSIBILITIES:
PREFERENCE WILL BE GIVEN TO A CANDIDATE WHO CAN WORK ONSITE OVER HYBRID OVER FULL-TIME REMOTE (ON-SITE AS NEEDED).
IDENTITY AND ACCESS MANAGEMENT ENSURING THAT APPROPRIATE IDENTITY MANAGEMENT SINGLE SIGN ON MULTI-FACTOR AUTHENTICATION ACTIVE DIRECTORY AND APPLICATIONS ARE PROPERLY IMPLEMENTED AND CONFIGURED TO SUPPORT IT AND SECURITY OPERATIONS
RESPONSIBLE FOR AUTOMATION DEVELOPMENT AND IMPLEMENTATION OF DISPARATE SECURITY AND ENTERPRISE IT TOOLS
RESPONSIBLE FOR PLANNING DESIGNING DEVELOPMENT AND IMPLEMENTATION OF ENTERPRISE SECURITY SOLUTIONS THAT ALIGN WITH BUSINESS GOALS AND RISK TOLERANCE.
DESIGN DEPLOY AND MANAGE COUNTERMEASURES TO KNOWN SECURITY THREATS AND DEVELOP PREVENTATIVE MITIGATION STRATEGIES FOR NEW AND EMERGENT THREATS TO ENTERPRISE DATA NETWORKS AND ASSOCIATED SERVICES.
ENSURE VALIDATE AND MEASURE THE CONSISTENT APPLICATION OF PROTECTIVE MEASURES THROUGHOUT THE ENTERPRISE BUSINESS APPLICATION AND INFRASTRUCTURE SUPPORT ENVIRONMENTS. TAKE APPROPRIATE ACTION TO PROTECT STATE DATA AND TECHNOLOGY SERVICES.
REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
FIVE YEARS OF EXPERIENCE AND EXPERT UNDERSTANDING OF IDENTITY AND ACCESS CONTROL LOGGING AND REPORTING SYSTEMS
FIVE YEARS OF EXPERIENCE AND EXPERTISE IN AUTOMATION DEVELOPMENT USING TOOLS SUCH AS PYTHON AND BASH
CYBER SECURITY AWARENESS AND UNDERSTANDING
FIVE YEARS OF EXPERIENCE WITH LINUX WINDOWS NETWORK SECURITY PROTOCOLS AND PROCEDURES
FIVE YEARS OF EXPERIENCE IN SUPPORTING LARGE IT ENVIRONMENTS AND/OR SYSTEM DEPLOYMENTS PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
SIEM ANALYSIS AND REPORTING
SECURITY FRAMEWORKS: NIST CSF CJIS IRS 1075 CMS MARS-E
APPLICATION SECURITY (APPSEC)
REQUIRED EDUCATION/CERTIFICATIONS:
BACHELORS DEGREE IN AN INFORMATION TECHNOLOGY OR
INFORMATION SECURITY RELATED FIELD
EIGHT YEARS OF RELEVANT WORK
EXPERIENCE MAY BE SUBSTITUTED IN LIEU OF EDUCATION
PREFERRED EDUCATION/CERTIFICATIONS:
CISSP CISA CISO OR EQUIVALENT ADVANCED SECURITY CERTIFICATION.
ADDITIONAL RELEVANT CERTIFICATIONS (E.G. CEH OSCP GPEN).
VENDOR CERTIFICATIONS IN SIEM OR LOGGING TECHNOLOGIES.
INTERVIEW PROCESS (phone video or in-person how many rounds of i/vs etc)
INITIAL ROUND OF INTERVIEWS ON MICROSOFT TEAMS (ON CAMERA) WITH IN-PERSON INTERVIEWS
PREFERRED BEFORE FINAL SELECTION INTERVIEW AVAILABILITY: How soon can you schedule an interview (date / times)
ASAP after posting closes and resumes are received and reviewed
View more
View less