Job Details

Lead Cyber Security Specialist

OWINGS MILLS-21117, MD, US
11/25/2019

-


Required Skills

    Microsoft Windows, computer skills
Company

Infinity Consulting Solutions, Inc

Experience

-

Job Description

Lead Cyber Security Specialist

Under the supervision of the Director, Cybersecurity Monitoring, Digital Forensics and Incident Response (DFIR), the incumbent’s accountabilities include, but are not limited to the following:

Deploy and support systems; security applications and hardware, infrastructure components to protect the security of company information.

Provide appropriate training to other security specialists and external customers on developed standards, procedures and guidelines.

Implement necessary enhancements/updates/upgrades to existing security products.

Assist in the configuration and installation of security products. Where possible, suggesting and
implementing possibilities to automate manual operational activities.

Represent Cybersecurity Monitoring and DFIR in disaster recovery procedures and exercises.

Evaluate emerging technologies in the areas of perimeter security, intrusion prevention and cloud security.

Perform periodic compliance reviews of firewall configurations.

Serve as lead technical coordinator/project lead and as a contributor to cross functional teams for
deployment and support of security specific infrastructure.

Provide support and guidance to a team of technically diverse personnel of senior level security specialists and junior level security specialists.

Design, implement, and integrate security solutions to address enterprise risks and exposures.

Design and implement security solutions to monitor the efficiency and effectiveness of security operations, controls and infrastructure.

Performing security governance through the design and implementation of security policies, procedures, guidelines and standards to maintain the confidentiality, integrity and availability of information systems and data.

Apply technology and processes to ensure the enterprise is protected and secured in the following areas:

Network devices and infrastructure, desktop/mobile devices and remote access to the network,

Information governance to ensure data is managed based on its sensitivity, information security policies, guidelines, and standards.

Provide general support to the Cybersecurity Monitoring and DFIR department in carrying out its’ assigned functions and responsibilities.

Provide off-hours support and problem resolution as directed by departmental requirements, service level agreements and internal support procedures.

Aid with audit issues and concerns affecting the Cybersecurity department

Interact with other Technical and Operation Support Service teams to develop tactical and strategic programs to address processes, controls, organization and infrastructure to manage risk and satisfy directives.

Properly interpret business and technical requirements into security solutions and designs that are consistent with the current security architecture.

Implement and assist in enforcement of company security policies.

Document results of system and application reviews including corrective action taken and security related documentation.

Assist with reviews of current and new company systems and applications, including changes to existing applications/systems, to assure compliance with Information Security policies and standards.

Apply creative thinking in problem solving and identifying opportunities for improvements in security.

Provide Information Security related recommendations regarding company infrastructure components (communications network, physical security, data access, computer hardware/software and data confidentiality, integrity, and availability).

Work with intra/interdepartmental technical and business personnel in a dynamic and varying environment.

Collaborate with other Security specialists, designers, developers, and architects.

Work with other technical teams in the organization such as IT Operations and IT Applications.

Share ideas, discuss alternatives, and seek input. Suggest means to decrease vulnerability of systems, applications and processes.

Maintain familiarity with state-of-the-art concepts, procedures, software and techniques in Security in order to be able to effectively assess and develop the Information Security environment.


Required
:

College Degree in an Information Security or Technology related field or equivalent experience plus 7+ years related work experience.

The incumbent will possess a high level of expertise in information security concepts, information security policies and system architecture concepts and have experience in process definition, workflow design, and process mapping.

In depth understanding in multiple areas of Information Security such as networking (TCP/IP, OSI model, network protocols), operating system fundamentals (Windows, Linux), security technologies (firewalls, switches, routers, IPSEC, IDS/IPS, etc.), authentication technologies, (TACACS, RADIUS, etc.), encryption key management, and mobile device technologies.

Also, must have knowledge of incident response, security policy creation, enterprise security strategies, and governance.

Must have an ability to quickly and effectively learn Information Security tools in a large, complex multi-platform environment.

Abilities/Skills:

Ability to identify and resolve complex issues and develop security solutions to meet business and technology goals.

Strong written documentation skills and technical writing are required.

Excellent presentation and verbal communication skills.

Ability to effectively complete tasks with a minimal level of supervision.

Strong computer skills, including knowledge of Microsoft Windows, various e-mail systems (Lotus Notes,
Microsoft Exchange) and unified communication systems (Office Communication Server).

Possess broad understanding of the following systems/skill sets:

System hardening concepts and techniques

Firewalls: Palo Alto Networks, Checkpoint, Juniper or Cisco

Network and remote access controls

Advanced routing protocols such as BGP

Exposure to one or more cloud environments - AWS or Azure

Cloud security methodologies and technologies

Threat / Intrusion Prevention technologies



Preferred
:

Professional certification such as CISSP, CISM (lead level only)

Ability to understand and apply appropriate policies and procedures.

Basic understanding of SIEM tools and system log analysis.

Knowledge of ethical hacking techniques and counterattack methodologies.

Familiarity with penetration testing tools

Experience with Bro, Zeek, SNORT or Suricata

Familiarity with scripting and/or automation technologies such as Python and Ansible are highly desirable

Experience working with Information Security tools in a large, complex, multi-platform environment.


Security Analyst
Information Technology

No Preference
FullTime Job
Other
1

Candidate Requirements
-
Bachelors

Walkin Information
-
11/18/2019
-

Recruiter Details
Doug Klares
1350 Broadway, Suite 2205, NEW YORK-10018, NY
-