Key Accountabilities
- CYBERSECURITY TECHNOLOGIES: Implements operates and participates in designing cybersecurity protective technologies including endpoint detection and response cloud infrastructure controls and network protections.
- TECHNOLOGY MANAGEMENT: Operates technologies such as wide area network partner gateways internet of things security email collaboration tools local area network wireless and network segmentation virtual private networks proxies demilitarized zones middle tier systems databases and web servers.
- CO-CREATION WITH IT OPERATIONS: Participates as a co-creator and operating partner with internal cross functional teams on shared infrastructure initiatives.
- IT SERVICE MANAGEMENT INTERFACES: Operates all information technology service management interfaces including asset change configuration problem and request management.
- RESEARCHES SECURITY NEEDS: Researches moderately complex system security needs for operations development including security requirements definition risk assessment and systems analysis.
- SECURITY POLICIES: Drafts and provides analytical support for security policy development and analysis in compliance with industry standards.
- INCIDENT RESPONSE: Prepares and performs moderately complex incident response disaster recovery and business continuity planning ensuring readiness for potential security breaches.
Qualifications
- Minimum requirement of 2 years of relevant work experience. Typically reflects 3 years or more of relevant experience.
- Hands on experience with Microsoft Defender and or Tanium is preferred.
- Hands on experience with Malware protection Malware analysis and Endpoint protection
- Hands on experience with Mobile Security and JAMF.
#Standard
Required Experience:
Contract
Job Purpose and Impact The Professional Cyber Engineering & Technology Operations job designs implements and operates the cybersecurity protective technologieswith a primary focus on endpoint security technology within the organization. With minimal supervision this job oversees and ensures robust p...
Key Accountabilities
- CYBERSECURITY TECHNOLOGIES: Implements operates and participates in designing cybersecurity protective technologies including endpoint detection and response cloud infrastructure controls and network protections.
- TECHNOLOGY MANAGEMENT: Operates technologies such as wide area network partner gateways internet of things security email collaboration tools local area network wireless and network segmentation virtual private networks proxies demilitarized zones middle tier systems databases and web servers.
- CO-CREATION WITH IT OPERATIONS: Participates as a co-creator and operating partner with internal cross functional teams on shared infrastructure initiatives.
- IT SERVICE MANAGEMENT INTERFACES: Operates all information technology service management interfaces including asset change configuration problem and request management.
- RESEARCHES SECURITY NEEDS: Researches moderately complex system security needs for operations development including security requirements definition risk assessment and systems analysis.
- SECURITY POLICIES: Drafts and provides analytical support for security policy development and analysis in compliance with industry standards.
- INCIDENT RESPONSE: Prepares and performs moderately complex incident response disaster recovery and business continuity planning ensuring readiness for potential security breaches.
Qualifications
- Minimum requirement of 2 years of relevant work experience. Typically reflects 3 years or more of relevant experience.
- Hands on experience with Microsoft Defender and or Tanium is preferred.
- Hands on experience with Malware protection Malware analysis and Endpoint protection
- Hands on experience with Mobile Security and JAMF.
#Standard
Required Experience:
Contract
View more
View less