Description
Essential Job Functions
- Analyzes vulnerability report and develops countermeasures for mitigating enterprise-wide systems.
- Identifies security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives.
- Performs and evaluates vulnerability scans within a multi-platform, large enterprise environment. Reacts to and initiates corrective action regarding security violations, attempts to gain unauthorized access, virus infections that may affect the network or other event affecting security.
- Reviews, recommends and oversees the installation, modification or replacement of hardware or software components and any configuration change(s) that affects security.
- Assesses assigned system to determine system security status. Designs and recommends security policies and procedures to implement; ensures compliance to policies and procedures.
- Leads investigations of security violations and breaches and recommends solutions; provides analysis summary to management and recommends alternative courses of action as necessary.
- Provides product recommendations of security packages to customers; Reviews vendor products and makes recommendations as appropriate. Conducts cost analyses to determine feasibility of new products for clients.
- Oversees and applies appropriate security patches to protect and maintain system integrity.
- Develops and maintains appropriate system documentation to ensure that documentation is current.
- Assists in elevated account management and auditing computer systems to ensure they are operating securely and that data is protected from both internal and external attack.
- Assists in investigating and resolving related to security incidents to ensure compliance with policy, procedure and customer specific requirements.
- Monitors, evaluates, and maintains security systems and procedures to safeguard internal information systems.
- Assists in reviewing system security requirements to determine if security systems are in compliance with established standards.
- Reviews computer logs and messages to identify possible security violations and breaches; assists with the preparation of reports.
Qualifications
- Bachelor’s degree or equivalent combination of education and experience
- Six or more years of experience in a client-server environment
- Experience working with Windows systems administration and database administration
- Experience in network, host, data and/or application security in multiple operating system environments
- Experience working with IP networking, networking protocols and understanding of security related technologies including encryption, IPsec, PKI, VPNs, firewalls, proxy services, DNS
- Experience working with internet, web, application and network security techniques
- Experience working with relevant operating system security (Windows, Solaris, Linux, etc.)
- Experience working with federal regulations related to information security (FISMA, FIPS, NIST, etc.)
- Possess secret security clearance
- CISSP certification preferred
- U.S. Citizenship required
- Strong Systems Administration knowledge of Windows, VMWARE, UNIX
- Experience in Windows scripting and PowerShell
- Ability to work independently and as part of a team
- Ability to perform and interpret vulnerability assessments
- Ability to balance and prioritize work
- Strong analytical and problem solving skills to troubleshoot and resolve network/operating system security issues
- Interpersonal skills to interact with customers and team members
- Communication skills to interact with team members and support personnel
- Analytical and problem solving skills for investigating security issues
CSC is an Equal Opportunity Employer M/F/D/V
Article source: http://jobview.monster.com/Information-Security-Engineer-Leader-Arlington-VA-Active-Secret-Reqd-Job-ARLINGTON-VA-US-102861814.aspx
View full post on National Cyber Security