- 2 -
- 5 years experience in cybersecurity in an enterprise environment including: security
tool deployment and support, security risk, vulnerability analyses and remediation
- Advanced understanding of TCP/IP, common networking protocols, traffic flow,
system administration, OSI model, defense-in-depth and common security elements
such as NIST and other industry relevant cybersecurity frameworks
- Demonstrated experience with conducting security assessments, implementing
information security recommendations, analyzing technical controls, and applying
security control standards.
- Must have demonstrated experience with applicable Industry Standards and
Frameworks; specifically, Information Technology Infrastructure Library (ITIL),
Centre for Internet Security Critical Security Controls (CIS CSC), NIST Cybersecurity
Framework (CSF) and Payment Card Industry Data Security Standard (PCI DSS)
- One or more of the following certifications: CompTIA Security+, Microsoft Certified
Systems Administrator: Security, Certifications in one or more of the following areas
is preferred: Certified Information Systems Security Professional (CISSP), Certified
Information Systems Auditor (CISA), and/or SANS GIAC Security Essentials (GSEC),
Additional certifications from Palo Alto, VMware, or Citrix will be seen as an asset.
- Hands-on experience analyzing high volumes of logs, network data and other attack
artifacts
- Experience with vulnerability scanning solutions
- Proficiency with antivirus and security software including Carbon Black Cloud
Sensor and Windows Defender
- Experience with SIEM solutions such as AlienVault considered an asset
- Experience working with 3rd parties to engage, conduct, deliver assessments and
recommended remediations
Responsibilities:
Strategy & Planning
- Assist with the design and implementation of business continuity,
incident response and disaster recovery plans for operating systems,
databases, networks, servers, and software applications in
collaboration with internal systems stakeholders.
- Assess need for ongoing proactive security reconfigurations (minor
or significant) and execute them as required.
- Conduct research on emerging threats, products, services, protocols,
and standards in support of security enhancement and ongoing
development efforts.
Acquisition & Deployment
- Maintain up-to-date detailed knowledge of the IT security industry
including awareness of new or revised security solutions, best
practices, improved processes, and the development of new attacks
and threat vectors.