A cybersecurity specialist, who will be an integral part of a customer's SecOps team, is responsible for ensuring that the network and data of the organization and its offsite locations are secure. As the Cybersecurity Specialist, you will work closely with the organization's networking and application teams in order to ensure compliance and adhere to the organization's standards, such as those outlined by CIS and NIST.
Qualifications & Responsibilities:
● Knowledge of NIST CSF and CIS Framework.
● Experience in working with AWS Cloud Platforms.
● Knowledge of Windows and Linux environments.
● Proactively assesses potential risks and vulnerabilities, and drive remediation efforts. Examples: Project Risk Assessments, Threat Identification.
● Track and report on IT security issues as part of overall risk and project management.
● Review, approve/deny firewall rule requests, provide policy remediation and enhancements.
● Monitor Forcepoint DLP rules and policies.
● Audit and alignments of security device configuration to comply with group standards.
● Manage and document all audit relevant changes to the network, as they are security relevant. This includes proper user right setup and documentation.
● Support information security systems and solutions. Examples: Vulnerability Scanning, Data Loss Prevention, SIEM, EDR, PAM.
● Proactively assesses potential risks and vulnerabilities, and drive remediation efforts. Examples: Project Risk Assessments, Threat Identification.
● Respond to information security incidents, including investigations/forensics and lead cross- functional teams as necessary.
● Assist in performing vulnerability scans, analysis, reporting, and subsequent remediation actions.
● Monitors and tests the deployment of security infrastructure to ensure its full deployment and effectiveness.
● Assists with incident response through the life cycle including following up with lessons learned and remediation measures to prevent similar future incidents.
● Reviews and verifies security patch processes to ensure critical patches are applied to systems properly.
● Assists with the installation, configuration, and deployment of cybersecurity infrastructure across workstations, servers and system platforms.
● Assists with the development, planning and performance of penetration tests; interprets results, and develops and communicates recommendations for improvement to management.
Experience With One or More Technologies is A Plus:
● F5 LTM, GTM, ASM, AFM, iRules
● Python and/or PowerShell
● Splunk
● Phanthom SOAR
● Cisco IOS/Nexus, ISECisco IOS/Nexus, ISE
● Tufin
● Corelight, Suricata or Zeek
● Cymulate
● Safebreach
● Qualys
● CrowdStrike
● CyberArk PAS, EPM, PTA
● CheckPoint R80+
● Salesforce
● Veracode
● Forcepoint DLP and Web