Security systems specialist job description
Example security systems specialist requirements on a job description
- Bachelor's degree in Computer Science or related field.
- Minimum of 3-5 years of experience in security systems.
- Proficient in configuring, monitoring and troubleshooting security systems.
- Knowledge of local, state, and federal regulations.
- Experience with network security systems.
- Excellent communication and customer service skills.
- Ability to work independently and as part of a team.
- Strong analytical and problem-solving skills.
- Attention to detail and ability to multitask.
Security systems specialist job description example 1
Peraton security systems specialist job description
Peraton is seeking qualified individuals to join our team to provide engineering support for Cyber Situational Awareness (SA), Cyber Command and Control (C2), Mission Assurance, and Homeland Defense. This includes conducting Agile software engineering in a Development, Security, and Operations (DevSecOps) environment, performing Cloud architectural design, operation, and administration functions, and cyber security and Risk Management Framework (RMF) support. Also included are rapid design, development, test, deployment, maintenance and operation of specific software and hardware capabilities to meet current Cyber Defensive needs.
Provides technical and programmatic Information Assurance Services to internal and external customers in support of network and information security systems. Designs, develops and implements security requirements within an organization's business processes. Prepares documentation from information obtained from customer using accepted guidelines such as RMF (Risk Management Framework). Prepares test plans. Provides assessment and authorization (A&A) support in the development of security and contingency plans and conducts complex risk and vulnerability assessments. Analyzes policies and procedures against Federal laws and regulations and provides recommendations for closing gaps. Develops and completes system security plans and contingency plans. Recommends system enhancements to improve security deficiencies. Develops, tests and integrates computer and network security tools. Secures system configurations and installs security tools, scans systems in order to determine compliancy and report results and evaluates products and various aspects of system administration. Conducts security program audits and develops solutions to lessen identified risks. Develops strategies to comply with privacy, risk management, and e-authentication requirements. Provides information assurance support for the development and implementation of security architectures to meet new and evolving security requirements. Evaluates, develops and enhances security requirements, policy and tools. Provides assistance in computer incident investigations. Performs vulnerability assessments including development of risk mitigation strategies.
This position is contingent upon contract award.
Qualifications- Requires 8 to 10 years with BS/BA or 6 to 8 years with MS/MA or 3 to 5 years with PhD.
- Minimum certification as 461 (or similar as required by the Technical Instruction) at the Intermediate level per DoDD 8140.01, or successor.
- IAT Level III Certification
- Secret clearance
- 5 years experience in performing Risk Management Framework (RMF) activities
- Experience with performing STIG assessments to include using SCAP benchmarks
- Experience performing vulnerability assessments with the Assured Compliance Assessment Solution tool
- Experince using EMASS
- Experience in developing Plans of Actions and Milestones (POA&M) entries
- Experience in completing Risk Management Framework Step 5 authorizations in the Inormation System Security Engineer (ISSE) capacity
- Experience in communicating risk reduction recommendations to stakeholders
Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can't be done, solving the most daunting challenges facing our customers.
An Equal Opportunity Employer including Disability/Veteran.
Security systems specialist job description example 2
Vencore security systems specialist job description
Peraton is seeking qualified individuals to join our team to provide engineering support for Cyber Situational Awareness (SA), Cyber Command and Control (C2), Mission Assurance, and Homeland Defense. This includes conducting Agile software engineering in a Development, Security, and Operations (DevSecOps) environment, performing Cloud architectural design, operation, and administration functions, and cyber security and Risk Management Framework (RMF) support. Also included are rapid design, development, test, deployment, maintenance and operation of specific software and hardware capabilities to meet current Cyber Defensive needs.
Provides technical and programmatic Information Assurance Services to internal and external customers in support of network and information security systems. Designs, develops and implements security requirements within an organization's business processes. Prepares documentation from information obtained from customer using accepted guidelines such as RMF (Risk Management Framework). Prepares test plans. Provides assessment and authorization (A&A) support in the development of security and contingency plans and conducts complex risk and vulnerability assessments. Analyzes policies and procedures against Federal laws and regulations and provides recommendations for closing gaps. Develops and completes system security plans and contingency plans. Recommends system enhancements to improve security deficiencies. Develops, tests and integrates computer and network security tools. Secures system configurations and installs security tools, scans systems in order to determine compliancy and report results and evaluates products and various aspects of system administration. Conducts security program audits and develops solutions to lessen identified risks. Develops strategies to comply with privacy, risk management, and e-authentication requirements. Provides information assurance support for the development and implementation of security architectures to meet new and evolving security requirements. Evaluates, develops and enhances security requirements, policy and tools. Provides assistance in computer incident investigations. Performs vulnerability assessments including development of risk mitigation strategies.
Qualifications- Requires 8 to 10 years with BS/BA or 6 to 8 years with MS/MA or 3 to 5 years with PhD.
- Minimum certification as 461 (or similar as required by the Technical Instruction) at the Intermediate level per DoDD 8140.01, or successor.
- IAT Level III Certification
- Secret clearance
- 5 years experience in performing Risk Management Framework (RMF) activities
- Experience with performing STIG assessments to include using SCAP benchmarks
- Experience performing vulnerability assessments with the Assured Compliance Assessment Solution tool
- Experince using EMASS
- Experience in developing Plans of Actions and Milestones (POA&M) entries
- Experience in completing Risk Management Framework Step 5 authorizations in the Inormation System Security Engineer (ISSE) capacity
- Experience in communicating risk reduction recommendations to stakeholders
Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can't be done, solving the most daunting challenges facing our customers.
An Equal Opportunity Employer including Disability/Veteran.
Security systems specialist job description example 3
HarborOne Bank security systems specialist job description
Include the following. Other duties may be assigned.
+ Oversight of and reporting on the status of vulnerability assessments and penetration testing as well as related remediation.
+ Oversight and reporting on the status of patch management and overall end-point protection.
+ Collaborate with the Technology and Security teams on the design and implementation of existing and new technologies; provide recommendations to ensure appropriate security considerations.
+ Ensure changes for certain key, high risk systems are properly documented and authorized.
+ Perform ongoing periodic user access and administrator activity reviews for technologies utilized by the bank and mortgage companies.
+ Work with CISO and Technology management to track and validate remediation responses to IT audit findings.
+ Work with the CISO and Technology Management to provide input with regard to proposed IT security solutions, and make recommendations in an effort to enhance the security posture. Perform periodic IT security reviews, and control testing.
+ Monitor security systems for anomalies and respond to, or escalate potential security events as needed.
+ Actively participates in the development of Incident Response and Business Continuity planning, testing and response plans.
+ Assist business units with completing annual risk assessments for technologies in use.
+ Assist with change control processes to ensure changes meet security requirements.
+ Assist with the development and coordination of metrics designed to guide security decisions and allocation of security-related resources.
+ Assist with policy and procedure documentation as it relates to the Information Security Program and system administrators.
+ BA in computer science, cybersecurity or related field.
+ At least 3 years of experience in the Information Technology, Information Security, or Cyber Security field or related position.
+ Information security certifications preferred: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Security Auditor (CISA) or similar industry certification.
+ Strong Communication skills (written and verbal) to accurately update projects, policies, procedures, and audit responses. Ability to write routine reports and correspondence.
+ Experience with network security design, implementation, and support of an enterprise environment, preferably a banking environment.
+ Knowledge of compliance and regulatory program requirements, such as GLBA, MA201.CMR.17, and various FFIEC Guidelines and experience performing IT Risk Assessments and GLBA Risk Assessments and applying risk frameworks (i.e. NIST, CIS, etc).
+ Demonstrated project management skills and ability to track and report progress against established milestones, metrics and deliverables
+ Understanding of Microsoft security functions (Active Directory, Authentication, group policy, local policy, permissions etc.) and how to use these facilities to diagnose issues or increase security posture.
Understanding of these key security control areas:
+ Risk Assessments
+ Endpoint protection systems (e.g. antivirus, file-integrity monitoring)
+ Intrusion Detection and Prevention Systems (IDS/IPS)
+ Vulnerability Management and Penetration Testing
+ Patch Management
+ System and Network Security Hardening
+ Data Loss Prevention (DLP)
+ Multi-factor Authentication (MFA)
+ Identity Access Management (IAM)
+ Cloud Computing (e.g. Office 365, AWS, Google Cloud, etc.)
+ Security Awareness (phishing testing, phishing training)
OTHER SKILLS AND ABILITIES
Familiarity with these technologies is a plus: Microsoft Office, SCCM, Microsoft SharePoint, Microsoft Azure, Microsoft Active Directory Services, Next-Gen Anti-Virus Solutions (i.e. Crowdstrike), Varonis, AWS/Cloud Trail, and risk assessment tools such as WolfPAC, UpGuard or similar GRC tools.
WORKING CONDITIONS/PHYSICAL REQUIREMENTS
+ General Office Environment: Yes
+ Physical Demands and Requirements: No
HarborOne Bank is an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, marital status, national origin, disability status, protected veteran status, or any other characteristic protected by law.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
ID: 2022-3101
External Company URL: www.harborone.com