Previous Job
Previous
Security Analyst
Ref No.: 16-00478
Location: Columbia, South Carolina
Client: Department of Probation, Parole, and Pardon Services
Location: Columbia,SC
Duration: 6 Months


Job Description:
Job Description: Develops and manages security for more than one IT functional area (e.g., data, systems, network and/or Web) across the enterprise. Assists in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures and use of firewalls and encryption routines). Prepares status reports on security matters to develop security risk analysis scenarios and response procedures. Responsible for the tracking and monitoring of software viruses. Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls. Involved in the evaluation of products and/or procedures to enhance productivity and effectiveness. Provides direct support to the business and IT staff for security related issues. Educates IT and the business about security policies and consults on security issues regarding user built/managed systems. Represents the security needs of the organization by providing expertise and assistance in all IT projects with regard to security issues. Must have extensive knowledge in networking, databases, systems and/or Web operations. More junior level position primarily focuses on security administration; a more senior level position is involved in developing enterprise security strategies, management of security projects and the most complicated security issues.

SCOPE OF THE PROJECT:
ENTERPRISE SECURITY ADMINISTRATION

DAILY DUTIES / RESPONSIBILITIES:
• WORKS UNDER LIMITED SUPERVISION TO ADMINISTER DAY TO DAY ENTERPRISE SECURITY CONTROLS USING VIRTUALIZATION AND ON PREMISE SECURITY HARDWARE TECHNOLOGIES.
• ANALYZE AGENCY SECURITY NEEDS, AS REQUIRED, AND LEADS IN THE IMPLEMENTATION OF SECURITY SPECIFICATIONS TO MEET THOSE NEEDS;
• CONFIGURE WEB FILTERING APPLICATIONS TO MEET USER REQUIREMENTS;
• MONITOR AGENCY INFORMATION EVENT LOGS, ANALYZE, AND PERFORM ROUTINE SECURITY PRACTICES AS NEEDED
• ASSISTS IN IP BASED NETWORK ENVIRONMENTS MANAGEMENT AND MONITORING
• ASSIST WITH APPLICATION DEVELOPMENT SECURITY CONTROLS ;
• MAXIMIZE SECURITY CONTROLS USING INDUSTRY BEST PRACTICE;
• SUPPORTS AND ADHERES TO CHANGE MANAGEMENT PROCESS
• AWARENESS OF SECURITY-BASED CHANGES PROCESSES; I.E. PORT CHANGES, USER AUTHENTICATION, TRAFFIC LOGGING
• IDENTIFIES RISKS AND COMMUNICATES RISKS TO THE IT DIRECTOR AND IT TEAM;
• DEVELOPS TECHNICAL DOCUMENTATION FOLLOWING AGENCY STANDARDS;

REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
• EXPERIENCED IN MCAFEE ENTERPRISE SECURITY
• SKILLED IN JUNIPER FIREWALL/ SSL
• SKILLED IN VMWARE PRODUCTS
• EXPERIENCED WITH INTRUSION DETECTION SYSTEMS (IDS) AND PREVENTION SYSTEMS (IPS)
• SKILLED IN VLAN AND VPN NETWORKING
• EXPERIENCED WITH SIEM SYSTEMS
• EXPERIENCED WITH WEB CONTENT FILTERING
• CANDIDATE MUST BE ABLE TO DEMONSTRATE WORKING KNOWLEDGE WINDOWS SERVER AND WINDOWS SECURITY POLICIES
• ABILITY TO COMMUNICATE WITH THE IT TEAM, PROJECT STAFF, AND VENDOR PARTNERS.

PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
• EXPERT USING VARIOUS SECURITY TOOLS SUCH AS WIRESHARK
• GOOD UNDERSTANDING OF NETWORK PROTOCOLS INCLUDING TCP/IP, HTTP, DNS
• EXPERT WITH ACCESS CONTROL LOGGING AND EVENT HANDLING
• EXPERT WITH ROLE BASED ACCESS CONTROLS
• UNDERSTANDING OF CLOUD PLATFORMS
• EXPERT WITH RISK AND VULNERABILITY ASSESSMENTS
• GOOD UNDERSTANDING OF PENETRATION TESTING
• ADVANCED WITH PRIVILEGED USER MANAGEMENT
• GOOD UNDERSTANDING OF IDENTIFY ACCESS MANAGEMENT (IAM)
• GOOD INTERPERSONAL SKILLS
• PROACTIVE AND SELF-MOTIVATED
• SELF-MANAGE ABILITIES

REQUIRED EDUCATION:
BACHELOR'S DEGREE OR MASTER'S DEGREE IN CYBER SECURITY, COMPUTER SCIENCE, OR INFORMATION SYSTEMS/TECHNOLOGY MANAGEMENT, INSTITUTE DEGREE/CERTIFICATE OR EQUIVALENT WORK EXPERIENCE.

Preferred CERTIFICATIONS:
Client Security Certified Product Specialist
(ePO, HIPS, DLPe, SIEM)
Juniper Networks Certified Specialist FWV (JNIS-FWV)
CISSP

***These are preferred, not required
 
Skills  
Skills:
Category
Name
Required
Importance
Level
Last Used
Experience
Cloud cloud platforms / environments No 2 Expert Within 1 Year 4 - 6 Years  
Network Security MCAFEE ENTERPRISE SECURITY Yes 1 Lead Currently Using 6 + Years  
Network Security Security Information Event Management (SIEM) systems development / configuration Yes 1 Lead Currently Using 4 - 6 Years  
Network Security Windows Security - Group Policy Yes 1 Lead Currently Using 6 + Years  
Network Security Ability to install and use various security tools No 2 Expert Currently Using 4 - 6 Years  
Network Security Penetration Testing No 2 Expert Within 1 Year 2 - 4 Years  
Network Security risk/vulnerability assessments No 2 Expert Within 1 Year 4 - 6 Years  
Network Security Role Based Access Control (RBAC) No 2 Expert Within 6 Months 4 - 6 Years  
Network Security wireshark No 2 Expert Within 6 Months 4 - 6 Years  
Networking & Directories JUNIPER FIREWALLS Yes 1 Lead Currently Using 6 + Years  
Networking & Directories Juniper SSL Yes 1 Lead Currently Using 4 - 6 Years  
Networking & Directories Virtual LAN (VLAN) Yes 1 Lead Currently Using 6 + Years  
Networking & Directories VPN - virtual private network Yes 1 Lead Currently Using 6 + Years  
Networking & Directories Access control logging and reporting systems No 2 Expert Currently Using 4 - 6 Years  
Networking & Directories Identity Access Management (IAM) No 2 Expert Within 1 Year 2 - 4 Years  
Networking & Directories privileged user management (PUM) No 2 Advanced Within 1 Year 2 - 4 Years  
Operating Systems/APIs VMWare Yes 1 Lead Currently Using 4 - 6 Years  
Operating Systems/APIs Wide Area Network (WAN) Yes 1 Lead Currently Using 6 + Years  
Operating Systems/APIs Windows Server 2012 R2 Yes 1 Lead Currently Using 4 - 6 Years  
Protocols Intrusion Detection Systems (IDS) Yes 1 Lead Currently Using 6 + Years  
Protocols IPS Yes 1 Lead Currently Using 6 + Years  
Protocols Knowledge of networking protocols, including TCP/IP, HTTP, NTP, DNS, MLLP, NDM No 2 Expert Currently Using 6 + Years  
Specialties Event Handling No 2 Expert Currently Using 2 - 4 Years  
Web Tools Web Content Filtering Yes 1 Lead Currently Using 4 - 6 Years  
Additional Skills: REQUIRED EDUCATION:
BACHELOR'S DEGREE OR MASTER'S DEGREE IN CYBER SECURITY, COMPUTER SCIENCE, OR INFORMATION SYSTEMS/TECHNOLOGY MANAGEMENT, INSTITUTE DEGREE/CERTIFICATE OR EQUIVALENT WORK EXPERIENCE.
Preferred CERTIFICATIONS:
Client Security Certified Product Specialist
(ePO, HIPS, DLPe, SIEM)
Juniper Networks Certified Specialist FWV (JNIS-FWV)
CISSP

***These are preferred, not required