Sr. Security Specialist Position

From: Kimberly Kimani (kimberly.kimaniat_private)
Date: Tue Sep 10 2002 - 12:35:02 PDT

  • Next message: Jeff Combs: "Security Analyst - Indiana"

    
     ('binary' encoding is not supported, stored as-is)
    Sr. Security Specialist
    
    Position Description:  
    The scope of this role covers all utilized enterprise technologies, 
    distributed and infrastructure-based systems. 
    This person must be able to develop and implement flexible security 
    solutions, dictated by the needs of a hybrid and rapidly evolving 
    centralized/decentralized business environment. The individual must be a 
    results-oriented person who can achieve tangible improvements in the data 
    security arena. Excellent technical and communications skills are a must, 
    as is proven information security experience in a medium-to-large business 
    organization.
    
    The responsibilities of the Security Specialist will include the following:
    Activities include working with management in defining and implementing an 
    ongoing risk assessment program, which will define, identify and classify 
    critical information assets, assess threats and vulnerabilities regarding 
    those assets and implement safeguard recommendations.
    Assist internal audits in the development of appropriate criteria needed 
    to assess the level of new/existing applications and/or technology 
    infrastructure elements for compliance with enterprise security standards.
    Establish and monitor programs regarding enterprise security standards 
    relating to the procurement of new applications or technologies.
    Evaluate changes to the processing environment for security impact and 
    present findings to management.
    Help in monitoring and protection of data processing resources.
    Candidates for this position must have the ability to implement security 
    solutions, as well as the ability to design the solutions.
    
    Responsibilities include:
    Work with a variety of security tools to evaluate security 
    vulnerabilities, including but not limited to: ISS products, SNORT, 
    Nessus, nmap, Sniffers (TCPDump, Snoop), and others.
    Configure security features (ACL’s, SSH, RSA Secure ID, etc) on Cisco 
    routers, switches, and firewalls, as well as other networking equipment.
    Implement security enhancements on: NT Servers, Web Servers (IIS, Netscape 
    and Apache), Exchange, Sendmail, DNS, Cisco Routers and Switches, Solaris, 
    Linux systems.
    Configure and support server operating systems including Solaris, Linux, 
    Windows NT 4.0 and Windows 2000. 
    Prepare detailed documentation including diagrams and configuration 
    descriptions. 
    
    Minimum Requirements:
    Graduate degree in Computer Science or Engineering.
    Thorough knowledge of TCP/IP network services and security vulnerabilities.
    Experience in mid to large corporate or government environments.
    Hands-on experience installing, configuring and/or maintaining security 
    components such as enterprise security software products.
    Experience configuring/maintaining firewall products (PIX / CheckPoint)
    Familiarity with SNMP, Syslog and other Network Management tools.
    
    Special Skills/Qualifications:
    The position will be 100% Security. Need 5-7 years experience in Security.
    Knowledge and understanding of network security architectures, elements, 
    and practices. Experience in the design and operation of firewalls / DMZs, 
    VPNs, and IDS.
    Vulnerability testing in addition to penetration testing,
    Experience responding to network security incidents. 
    Experience with Unix, shell scripts, Perl. 
    Knowledge of Cisco routers and IOS.
    Experience in PKI and authentication mechanisms and devices (desired).
    Experience with directory services, LDAP (desired)
    A consensus-building attitude, while still results oriented and commitment 
    focused Internet-based security experience.
    A business-based attitude; i.e., the recognition that no policies can be 
    implemented without demonstrable business benefit.
    Ability to think and function well under pressure, and efficiently manage 
    multiple priorities and tasks.
    Self-starter and motivated team player with good communication skills. 
    



    This archive was generated by hypermail 2b30 : Tue Sep 10 2002 - 13:36:55 PDT