Job Description :
Role 1: Security Engineer
Location: Erlanger, KY
Job duration : 12 months+

Job Description:
Required Technical Skill Sets: Security Tools, Network security technologies, Knowledge in Windows / Unix Operating System and Identity access management
Desired Experience RangeTotal Experience - 6 – 8 experience
Relevant experience – 4 – 6 experience

Desired Competencies (Technical/Behavioral Competency)
Must-Have Technical:
5+ years’ experience in Information Security, including experience with security principles, and defense-in-depth techniques.
Possess functional knowledge and administrative experience on Windows and Unix/Linux Platforms.
Hands on experience designing, building, deploying, and administering complex security tools, including firewall, IDS/IPS, Network Packet Broker, WAF, and SIEM.
Strong security experience related to concepts of least privilege, risk management, vulnerability management, identity and access management, access controls, and segmentation.
Knowledge of DNS, network routing, authentication, VPN, proxy services, cloud, and DDOS mitigation technologies
Experience in Network security architecture development and definition
Implement secure syslog, Gigamon updates, Azure Security stack, Windows 10 security tool, DLP deployment.

Non-Technical:
Ability to communicate and collaborate effectively with other team members in a geographic and culturally diverse workforce
Expected to complete projects within specified deadlines.
Expected to work occasional nights, weekends, holidays, and overtime.
Expected to perform on-call duties.
Occasional Travel may be required.
Strong sense of professionalism and ethics.
Good-to-Have
Current holder of CISSP, or other industry certifications a plus.
Experience in successfully implementing and enforcing security layers in a large scale SCADA, DCS, or PLC environment.
Security project management experience preferred but not required.


Role 2: Security Architect
Location: Erlanger, KY
Job duration : 12 months+

Security Architect
Required Technical Skill SetSecurity Tools, Network security technologies, Knowledge in Windows / Unix Operating System and Identity access management
Desired Experience RangeTotal Experience - 8- 10 years of experience
Relevant experience – 5 – 6 years of experience

Desired Competencies (Technical/Behavioral Competency)
Must-Have Technical:
5+ years’ experience in Information Security, including experience with security principles, and defense-in-depth techniques.
Practical experience implementing TOGAF, or other enterprise security architectures aligned to NIST, ISO, COBIT or other industry standards.
Experience in security design and implementation in Azure, and AWS. Including full public IaaS, PaaS, to Hybrid environments.
Experience with vendor and consultant relationship management.
Security project management experience.
SIEM, Firewall, IDS\IPS, WAF, BRO, Big Data Analytics experience.
Practical knowledge of security solutions such as Active Directory, firewalls, IDS/IPS, PKI, and SIEM.
Functional knowledge and administrative experience on Windows and Unix/Linux Platforms.
Functional knowledge on Perimeter, Endpoint, and Data security controls.

Non-Technical:
Technical writing and process mapping experience.
Bachelors’ degree of equivalent experience.
Anticipates problems and identifies long-term implications of decisions and actions.
Ability to communicate and collaborate effectively with other team members in a geographic and culturally diverse workforce

Good-to-Have
Multiple years of experience in information systems with experience in designing, development and support of complex systems and solutions.
Current holder of CISSP or other industry certifications.

Responsibility of / Expectations from the Role
Participate in application, infrastructure, and security projects to provide security planning and guidance.
This position will require and understanding of cross-company business needs and designing solutions that meet business requirements while maintaining confidentiality, integrity and availability of information and systems.
Identify & document requirements, standards and architecture specifications for multiple Information Security Domains including but not limited to; Cloud (Public & Private), IDAM, SDLC.
Recommend reporting and metrics for the function. Perform Security Architecture design and Implementation recommendations. Plan, research, and design robust security architectures based on current security best practices and industry frameworks.
Perform risk analysis and security assessments.
Perform functions in a timely manner and with extreme level of attention to detail, urgency and thoroughness.

Role 3: Security Architect
Location: Erlanger, KY
Job duration : 12 months+

JD:
Security Architect
Required Technical Skill SetSecurity Tools, Network security technologies, Knowledge in Windows / Unix Operating System and Identity access management
Desired Experience RangeTotal Experience - 8- 10 years of experience
Relevant experience – 5 – 6 years of experience
Location of Requirement Erlanger, KY or Decatur, IL

Desired Competencies (Technical/Behavioral Competency)
Must-Have Technical:
5+ years’ experience in Cyber Threat Intelligence Analyst, or an equivalent work experience.
Strong knowledge of IT, computer science concepts.
Bachelors’ degree in IT related major, an Intelligence major, or equivalent work experience.
Experience using Windows and Linux to perform tasks and some administration capability.
Experience using IDS/IPS, WAF, and SIEM.
Ability to break down complex threats in such manner that a non-it decision maker can accurately appreciate the threat.
Experience with disk forensics and both static and dynamic malware analysis.
Good understanding of technical and non-technical techniques used by Cyber Adversaries to attack and achieve their cyber goals.
Strong ability in intelligence analytic tradecraft including structured analytic techniques such as ACH, Devils Advocacy, Brainstorming, Red Team Analysis, etc.
Understanding of CTI analyst tradecraft including Cyber Kill Chain, Diamond Model, Pyramid of Pain, etc.
Experience using CTI subscriptions and CTI platforms.

Non-Technical:
Good communication skills.
Ability to prioritize work using the guidance of leadership.
Ability to communicate and collaborate effectively with other team members in a geographic and culturally diverse workforce
Expected to complete projects within specified deadlines.
Expected to work occasional nights, weekends, holidays, and overtime.
Expected to perform on-call duties.
Occasional Travel may be required.
Strong sense of professionalism and ethics.

Good-to-Have
CISSP, SANS certifications, or security related CompTIA certifications, or other industry certifications a plus.
Experience with cyber threat to SCADA, DCS, or PLC environments a plus

Responsibility of / Expectations from the Role
1
Collect, process, analyze, and disseminate strategic and tactical intelligence throughout the organization
Develop, maintain, and execute threat and risk communication processes
Demonstrate and apply subject matter expertise in a variety of information security disciplines, both technical and non-technical
Employ predictive analytic methods to determine changes in adversary’s capabilities, motivations, and intent, while providing recommendations to reduce risk before exposure to threats occur
Provide direct analytic support to the Security Operations and Incident Response teams, providing context to active threats using intelligence
Support daily operations and existing processes, as required by the CTI manager.
Understand the organizations CTI requirements from leadership.
Produce intelligence products by authoring documents and writing reports that satisfy the CTI requirements.
Understand, follow, and suggest improvements to current CTI processes.
Maintain an in-depth knowledge the current cyber threat landscape and of emerging cyber threats and trends.
A willingness to present your analysis and a willingness to respectfully defend the analysis in the face of opposing opinions, all while keeping an open mind.
Use of forensics techniques, malware analysis techniques, and network forensics techniques to analyze cyber-attacks.
Ability to lift 50 lbs. and detect color coded events
2 Under general supervision, using Customer’s Cyber Threat Intelligence (CTI) processes in place, perform general CTI analyst tasks to help the organization understand the cyber threats it faces and how they may be actioned. These will include understanding Customer’s intelligence requirements, performing collections, processing and analysing intelligence, producing actionable intelligence products, and distributing CTI products throughout the enterprise. Interface with IT, a broad range of internal business units, and members of broader cyber intelligence community to collect, process, and distribute intelligence.
3 Must display enthusiasm and interest in Cyber Threat Intelligence and draw recommendations based on real world experience.


Client : Confidential

             

Similar Jobs you may be interested in ..