Information Security Engineer with CISSP/ (567557)/F2F required

Location: Dimondale, MI
Date Posted: 06-22-2018
Information Security Engineer with CISSP/ (567557)/F2F required
Dimondale, MI
Duration: 12 Months
F2F
 
Short Description:
Establish the target security/infrastructure architecture.
 
Complete Description:
The manager is looking for a Technical Lead that can “play in the middle” between a Security Architect and a Systems Administrator supporting a portfolio of projects and rollouts.  Must be able to communicate well across groups, roles and levels of technical knowledge (Project Managers, Security Architects, Enterprise Architects, Systems Administrators and Technical Team Leaders).  Must have the ‘technical chops’ to help facilitate and orchestrate security platform implementations at various levels of hands on expectations.
 
Years of Experience:
3+ years of experience in security architecture
5+ years of Server and/or Application Security
9+ years of experience in information security
9+ years of experience working with computer systems
9+ years of experience working with network software and hardware, data or voice as well as experience with open and proprietary software and hardware
 
Job Description:
Establish the target security/infrastructure architecture. Author corresponding requirements, including definition of dependencies on infrastructure consolidation efforts.  Define Security/Information Assurance requirements (and dependencies).  Specify key architectural aspects of the architecture view, and identify other aspects that need definition.  Other duties include researching best practices for reuse, applying State IT Security and industry standards, and defining the transformation approach that transitions the current architecture to the target architecture.
Experience working with current and emerging information security technologies and development methodologies. Bachelor’s degree in computer science, management information systems, or related field preferred.  Good analytical and creative problem solving skills.
 
Relies on experience and judgment to plan and accomplish goals, independently performs a variety of complicated tasks, a wide degree of creativity and latitude is expected.
 
Additional Requirements:
Engineer, implement and monitor security measures for the protection of computer systems, networks and information
Identify and define system security requirements
Design computer security architecture and develop detailed cyber security designs
Prepare and document standard operating procedures and protocols
Configure and troubleshoot security infrastructure devices
Develop technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks
Ensure that the company knows as much as possible, as quickly as possible about security incidents
Write comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement
 
Skill       
Proven work experience as a system security engineer or information security engineer Required 5 Years
Experience in building and maintaining security systems Required 5 Years
Cyber Security Related Certification (CISSP or Related) Highly desired 5 Years
BS degree in Computer Science or related field Highly desired 5 Years
Experience working in highly complex Information Technology environments (large company or government) Required 10 Years
Experience in a system administration role supporting multiple platforms and applications Required 5 Years
Experience with network security and networking technologies and with system, security, and network monitoring tools Required 5 Years
Hands on experience in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management Required 5 Years
Experience designing secure networks, systems and application architectures Required 5 Years
Experience planning, researching and developing security policies, standards and procedures Highly desired 5 Years
Thorough understanding of the latest security principles, techniques, and protocols Required 5 Years
Detailed technical knowledge of database and operating system security Required 5 Years
Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocols Highly desired 5 Years
Ability to communicate network security issues to peers and management Required 5 Years
Ability to read and use the results of mobile code, malicious code, and anti-virus software Desired 5 Years
Knowledge of disaster recovery, computer forensic tools, technologies and methods Desired 5 Years
Knowledge of Network and/or Application Security Required 5 Years
 
Questions
Description
Question 1
Absences greater than two weeks MUST be approved by CAI management in advance, and contact information must be provided to CAI so that the resource can be reached during his or her absence. The Client has the right to dismiss the resource if he or she does not return to work by the agreed upon date. Do you accept this requirement?
Question 2
Please list candidate's email address that will be used when submitting E-RTR.
Question 3
The client plans to schedule IN PERSON ONLY interviews for this position June 29th and July 2nd. Please confirm your candidate will be available to interview any of those days if selected.
Question 4
Please include a paragraph re: candidate's availability, location, applicable skills, and other pertinent information in the Summary of Qualifications tab, when submitting.
Question 5
This is a true Engineering role. The manager is NOT looking for "Executive" level candidates. This is someone that can handle the day to day Engineering tasks and communicate with all Stakeholders. Please review the job description in the details tab and confirm that your candidate meets or exceeds these expectations.
 
Kiran Kumar
Key Business Solutions, Inc.
|| Office: 916 646 2080 Ext 224 || Fax: 916 646 2081 || Email: kiran@keybusinessglobal.com || Website: www.key-soft.com || Yahoo: kirankeysoft Gtalk: kiranjabukeysoft@gmail.com
Note: This email is not intended to be a solicitation.  Please accept our apologies and reply in the subject heading with REMOVE to be removed from our Mailing list.
 
 
or
this job portal is powered by CATS