drjobs A114: IA & SS Journeyman العربية

A114: IA & SS Journeyman

Employer Active

The job posting is outdated and position may be filled
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

others - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Job Description

We are looking for Information Assurance and Security Specialist (Min 6 years of exp) (Webcam interviews)
POSITION DESCRIPTION
DIRECT CLIENT Position
Number of positions: 1
Length: 11 Months + (annual extensions)
Location: Washington DC 20024
Immediate interviews Webcam interviews ONLY
Please note that this position is HYBRID (mostly REMOTE), Candidate needs to be onsite once every 2 weeks, rest REMOTE.
IA & SS Journeyman
Duties:
  1. As part of the client's technology team, the Security Specialist (Infrastructure Group) will be maintaining and monitoring day to day operation of the IT infrastructure Security.
  2. The IT Consultant will help and performs, monitoring, maintenance, and security IT infrastructure (physical, virtual and cloud).
  3. IT consultant will perform OS, security and application upgrades of servers and network to keep them up to date.
  4. IT consultant will develop, implements, maintains and enforces documented standards and procedures for the design, development, installation, modification, and documentation of assigned systems.
  5. IT consultant will plan, coordinates, and monitors project activities for client Infrastructure group and duties as assigned.
  6. Log analysis of Firewall, AD, Switches and other deployed security products Knowledge of vulnerability assessment tools to identify and mitigate issues.
  7. Research, analyze, and patch required systems to comply with client compliance mandates.
  8. Respond to escalation calls from the Help desk, Desktop support, and other teams to debug and resolve security and perform maintenance.
  9. Understands security troubleshooting processes and cooperates with another team.
  10. Assists Service Desk technicians as needed with Tier I and Tier II troubleshooting and patching of desktop systems, software (MS Office, Java, Adobe), printer issues, and server related issues as needed. Provides trouble-shooting assistance on production and non-production supported systems.
  11. May recommend methods and techniques for obtaining solutions. l. Initiates preventive maintenance for the technical system.
Responsibilities:
    1. Determines enterprise information assurance and security standards.
    2. Develops and implements information assurance/security standards and procedures.
    3. Coordinates, develops, and evaluates security programs for an organization. Recommends information assurance/security solutions to support customer's requirements.
    4. Identifies, reports, and resolves security violations.
    5. Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.
    6. Supports customers at the highest levels in the development and implementation of doctrine and policies.
    7. Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures.
    8. Performs analysis, design, and development of security features for system architectures.
    9. Analyzes and defines security requirements for computer systems which may include mainframes, workstations, and personal computers.
    10. Designs, develops, engineers, and implements solutions that meets security requirements.
    11. Provides integration and implementation of the computer system security solution.
    12. Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems.
    13. Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.
    14. Ensures that all information systems are functional and secure
Qualifications:
    1. 6-10 years of experience developing, maintaining, and recommending enhancements to IS policies/requirements (Required)
    2. 6-10 years of experience performing vulnerability/risk analyses of computer systems/apps (Required)
    3. 6-10 years of experience identifying, reporting, and resolving security violations (Required)
    4. Patching Server 2008 / 2012 /2016 (Required)
    5. Patching Desktop Windows 10 / 7 (Required)
    6. Firewall management CISCO NGFW (Required)
    7. Vulnerability assessment tools Nessus, Tripwire (Desired)
    8. VMware 5.5 / 6.0 (Required)
    9. Production support (Required)
    10. Server and Desktop troubleshooting (Required)
    11. NIST 800-53 experience (Desired)
    12. Splunk (Desired)
    13. Cloud experience (MS Azure) (Desired)
Education:
    1. Bachelor's Degree in IT or related field or equivalent experience (Required)
    2. Security+, CISSP, other security certifications (Preferred)
Candidates must have ALL the "Required" skills in order to be considered for the position.
Skill Matrix
Experience with Business workflow processes
Required / Desired
Amount
of Experience
Experience developing, maintaining, and recommending enhancements to IS policies/requirements
Required
6
Years
Experience performing vulnerability/risk analyses of computer systems/app
Required
6
Years
Experience identifying, reporting, and resolving security violations
Required
6
Years

Employment Type

Full Time

Company Industry

About Company

100 employees
Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.