Job Description :
Job Title: I/S Security Engineer
Location: Columbia, SC
Duration: 6 months

Short Description:
The HM is now looking for someone with Unix/Linux experience, particularly Solaris. RHEL and AIX would be a plus.

Education Requirements:
Bachelor''s degree in Computer Science, IT, or related field OR
2-year degree in Comp Sci, IT, or related + extra 2 yrs of related work exp (4 yrs)
OR extra 4 years of related experience (8 yrs

Skills Grid:
Related Technical experience; Unix/Linux (2 yrs) (Required)
IT security, risk assessment, and/or compliance experience (2 yrs) (Required)
Solaris 10/11 (Required)
Strong Analytical Skills (Required)
RHEL 5/6 and AIX 6.1/7.1 (Strongly Desired)
Security+ Certificate (Strongly Desired)

Daily responsibilities:
Assess security bulletins and alerts for applicability and impact. Coordinate remediation to include testing and deployment. Validates the configuration and vulnerability compliance of vital technology components such as operating systems and applications, specifically for the Unix/Linux platform (workstation and server Participates in remediation activities including applying security configurations.

Solaris 10 and 11
- Zones/LDOM
- Package management
- IPF Firewall
- Jumpstart
- OracleVM
Redhat 5 and 6
- Iptables Firewall
Kickstart AIX 6.1 and 7.1
- PowerVM
- Ipfilt Firewall

- Oracle DB
- Oracle Weblogic
- Apache HTTPD
- Apache Tomcat
- Tivoli TSM
- IBM BigFix
- CA ControlMinder

Primary work relationships:
Working with TSC (Service Desk and Workstation Support), ICT, Leverage Systems, SCRA, CMED, AMO, Governance and Security Officers. Interaction with customer and management (including senior management) may be required but would be minimal.

Job description:
15% Develops and implements enterprise information security architectures and solutions. Researches, designs, and advocates new technologies, infrastructure, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors.
15% Performs capacity and future growth planning of the enterprise security infrastructure to ensure a highly available security environment.
20% Evaluates and recommends procedures and processes for the prevention, detection, containment and correction of information security breaches. Analyzes business impact and exposure based on security threats, vulnerabilities, and risks. Advises management and users regarding security procedures.
20% Communicates security risks and solutions to business partners and appropriate IT staff as needed. Provides direct support and guidance for security related issues.
25% Anticipates and mitigates potential attacks through enterprise connections to ensure the security of the system(s Exploits weaknesses detected in systems to assess and prevent potential break-ins. Analyzes business impact and exposure based on security threats, vulnerabilities, and risks.
5% Monitors security agencies and services in order to keep apprised of current security threats and concerns. Evaluates products and/or procedures to enhance productivity and effectiveness of information security across the organization.

Behavior Characteristics:
Prefer someone with audit experience and an understanding of scripting and software repackaging.