drjobs Technician Cyber Security

Technician Cyber Security

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Norfolk - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

You will be responsible for the following:


Information security

  • Applies and maintains specific security measures as required by organisational policy and local risk assessments.
  • Contributes to the identification of risks that arise from potential technical solution architectures.
  • Suggests alternate solutions or countermeasures to mitigate risks.
  • Defines secure systems configurations in compliance with intended architectures.
  • Supports investigation of suspected attacks and security breaches.

Information assurance

  • Follows standard approaches for the technical assessment of information systems against information assurance policies and business objectives.
  • Makes routine accreditation decisions.
  • Recognises decisions that are beyond their scope and responsibility level and escalates according.
  • Reviews and performs risk assessments and risk treatment plans.
  • Identifies typical risk indicators and explains prevention measures.
  • Maintains integrity of records to support and justify decisions.

IT infrastructure

  • Carries out routine operational procedures including the execution of specified automation tools/scripts.
  • Contributes to maintenance and installation.
  • Monitors and reports on infrastructure performance to enable service delivery.
  • Resolves issues or refers to others for assistance.

Vulnerability assessment

  • Undertakes lowcomplexity routine vulnerability assessments using automated and semiautomated tools.
  • Escalates issues where appropriate.
  • Contributes to documenting the scope and evaluating the results of vulnerability assessments.

Information Security Administration

  • Works with access controls for firewalls and endpoint security solutions.


Requirements

Required Qualifications:


  • At least 4 years practical experience of implementation and maintenance of cyber security systems within a large organization.
  • Working experience administrating and monitoring cyber security software.
  • Good understanding of cyber security systems and the ability to work independently to solve problems.
  • Working experience troubleshooting technical issues and providing technical support to endusers.
  • Training/Certifications (desirable): Security Professional certification (CEH GIAC ISC2 or other relevant certification)

Education and Clearance

  • NATO Secret Clearance
  • Secondary educational qualification with 4 years postrelated experience.


Required Qualifications: General background in administration of Communications and Information Systems (CIS) including pertinent training and practical experience. Prior experience and a good knowledge of working with bespoke applications, Community-of-Interest (CoI) services within an engineering environment. Current knowledge of advances in IS technologies and Service Management. Experience in System Administration of both Windows and Linux Server Operating Systems. Broad and sound technical knowledge and experience in distributed Information Systems as they are applied to modern Command and Control Information Systems (C2IS); - Experience with MS SQL DB, other database packages, database queries and scripting. Experience in and a good working knowledge of Relational Databases management including backups, archiving and replication. Desirable Qualifications: Experience administering Functional Area Services such as JCHAT, JOCWATCH, ICC, JTS/FAST, LOGFAS, NCOP, TOPFAS, CORE

Employment Type

Full Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.