You will be responsible for the following:
- Applies and maintains specific security measures as required by organisational policy and local risk assessments.
- Contributes to the identification of risks that arise from potential technical solution architectures.
- Suggests alternate solutions or countermeasures to mitigate risks.
- Defines secure systems configurations in compliance with intended architectures.
- Supports investigation of suspected attacks and security breaches.
- Follows standard approaches for the technical assessment of information systems against information assurance policies and business objectives.
- Makes routine accreditation decisions.
- Recognises decisions that are beyond their scope and responsibility level and escalates according.
- Reviews and performs risk assessments and risk treatment plans.
- Identifies typical risk indicators and explains prevention measures.
- Maintains integrity of records to support and justify decisions.
- Carries out routine operational procedures including the execution of specified automation tools/scripts.
- Contributes to maintenance and installation.
- Monitors and reports on infrastructure performance to enable service delivery.
- Resolves issues or refers to others for assistance.
- Undertakes lowcomplexity routine vulnerability assessments using automated and semiautomated tools.
- Escalates issues where appropriate.
- Contributes to documenting the scope and evaluating the results of vulnerability assessments.
Information Security Administration
- Works with access controls for firewalls and endpoint security solutions.
Requirements
- At least 4 years practical experience of implementation and maintenance of cyber security systems within a large organization.
- Working experience administrating and monitoring cyber security software.
- Good understanding of cyber security systems and the ability to work independently to solve problems.
- Working experience troubleshooting technical issues and providing technical support to endusers.
- Training/Certifications (desirable): Security Professional certification (CEH GIAC ISC2 or other relevant certification)
- Secondary educational qualification with 4 years postrelated experience.
Required Qualifications: General background in administration of Communications and Information Systems (CIS) including pertinent training and practical experience. Prior experience and a good knowledge of working with bespoke applications, Community-of-Interest (CoI) services within an engineering environment. Current knowledge of advances in IS technologies and Service Management. Experience in System Administration of both Windows and Linux Server Operating Systems. Broad and sound technical knowledge and experience in distributed Information Systems as they are applied to modern Command and Control Information Systems (C2IS); - Experience with MS SQL DB, other database packages, database queries and scripting. Experience in and a good working knowledge of Relational Databases management including backups, archiving and replication. Desirable Qualifications: Experience administering Functional Area Services such as JCHAT, JOCWATCH, ICC, JTS/FAST, LOGFAS, NCOP, TOPFAS, CORE