Security Systems Engineer
Duration 6 months to startwill be extended beyond Work location Columbus, OH (will be remote until the Covidwork at home restriction has been lifted, then you would be expected to be onsite Monday through Friday ) Must be able to work independently without sponsorship Seeking a Cyber Security Engineer with at least 8 years of IT engineering, Security Engineering andor System Configuration and Maintenance. -Comprehensive knowledge of large enterprise environments (design, components, system communications, layers of defense etc.) -Ability to complete difficult and complex assignments on time within a fast-paced environment. -Investigates, interprets, and responds to technical andor complex IT security related scenarios. -Demonstrated ability to work with matrixed resources in a team environment. Possesses strong organizational, time management and diplomacy skills. -Engineering related, extensive exp with IT security tools (WAF, IDSIPS, Endpoint protection tools) -Technical knowledge of network, server, storage, and cloud hardware and software solutions. -Bachelorrsquos Degree from an accredited university in IT or Enterprise Security related discipline. Knowledge -Computer Network Defense frameworks, policies, procedures. -Traffic flows across the network (e.g., Transmission Control Protocol (TCP) and Internet Protocol (IP), Open System Interconnection Model (OSI), Information Technology Infrastructure Library, v3 (ITIL) -Network protocols such as TCPIP, Dynamic Host Configuration, Domain Name System (DNS), and directory services -Network security architecture concepts including topology, protocols, components, and principles (e.g., application of Defense-in-Depth) -Principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) -Intrusion detection, SIEM, Endpoint Management tools, configuration and maintenance -Network traffic analysis methods -Web filtering and Application Security technologies -System administration, network, and operating system hardening techniques. -Systems engineering theories, concepts, and methods -Principles and methods for integrating system components. -Applying hostnetwork access controls -System, network, and OS hardening techniques -Interpret and incorporate data from multiple tool sources -Perform daily routine tasks for Security Systems managed by the Office of Information Security and Privacy. -Establish facts draw valid conclusions and provide recommendations -Work in a collaborative team environment -Participate in projects for deployment, and or enhancements -Assist with knowledge transfer and mentoring of junior staff as needed. -Prepare documentation as requested, (process, procedures, standards, drawings, etc.) Duties bull
Recommends changes in IT security procedures to meet customer needs bull
Recommends changes in OISP tools and processes to endure compliance with policies, procedures security controls and regulatory requirements bull
Works with OISP, OIT Teams and agencies to develop and maintain the processes and procedures and recommends best practices in the support of enterprise security tools for the Office of information Security and Privacy (OISP) engineering teams (e.g.
SIEM, IDSIPS, WAF, Endpoint protection, web filtering, etc.) bull
Installs, maintains, configures, upgrades andor administers hardware andor software independently in workstation support, network administration, server administration, business continuity, information security, telecommunications and network connectivity, where technical work requires specific knowledge to evaluate, select, adapt modify standard procedures bull
Devises new approaches to problems encountered bull
Diagnoses, analyzes and resolves issues for customer(s) across assigned multiple technology domains bull
Creates, organizes, files and maintains documentation bull
Reviews and monitors enterprise security systems, takes appropriate action and responds to alarmsalerts per agency policy and procedures bull
Assists in developing solutions design bull
Interact with OISP security architects to design and deploy enterprise security tools (e.g.
SIEM, IDSIPS, WAF, end point protection, web filtering, etc.) bull
Works with vendors, other specialists andor agencies to solve integration problems bull
Performs all other duties assigned. Note bull
Operational needs may require weekend and evening work. bull
Successfully pass mandatory background checks.