Description

๐Š๐ž๐ฒ ๐‘๐ž๐ฌ๐ฉ๐จ๐ง๐ฌ๐ข๐›๐ข๐ฅ๐ข๐ญ๐ข๐ž๐ฌ:

๐Ÿ”’ Provide guidance and technical assistance to system administrators in securing systems and networks.
๐Ÿ”’ Ensure continuous monitoring of the entire network for security vulnerabilities and compromises.
๐Ÿ”’ Conduct security self-assessments (e.g., Penetration Testing) to evaluate the processes, procedures, and tools used to review, assess, and test information systems controls and security.
๐Ÿ”’ Report security status, vulnerabilities, and issues to management.
๐Ÿ”’ Collaborate with the Department of Administration Division of Enterprise Technology on pre- and post-implementation audits of new systems to ensure secure integration.
๐Ÿ”’ Perform periodic review and analysis of system integrity, data integrity, and data flows.
๐Ÿ”’ Ensure the quality and consistency of all IT-related activities, including standards, policies, and procedures.
๐Ÿ”’ Audit access rights and ensure alignment with policies.

๐‘๐ž๐ช๐ฎ๐ข๐ซ๐ž๐ ๐’๐ค๐ข๐ฅ๐ฅ๐ฌ & ๐„๐ฑ๐ฉ๐ž๐ซ๐ข๐ž๐ง๐œ๐ž:

โœ… 7+ years of experience in similar roles.
โœ… Strong understanding of Directory Services, including Active Directory.
โœ… Proficient in Modern Authentication, Authorization, and Accounting, including Role-based (RBAC) and Attribute-based Access Controls (ABAC).
โœ… Knowledgeable in Identity Access Management (IAM) systems and Network Access Control (NAC).
โœ… Strong understanding of SIEM methods and tools.
โœ… Familiarity with the National Vulnerability Database (NVD), Common Vulnerability Database (CVE), Common Weakness and Enumeration (CWE), and Common Attack Pattern Enumeration and Classification (CAPEC) Database.
โœ… Basic understanding of Transact-SQL and ANSI Structured Query Language (SQL).
โœ… Intermediate proficiency in PowerShell scripting.
โœ… Knowledge of NIST Risk Management Framework (RMF) and Cybersecurity Framework (CSF).
โœ… Understanding of cybersecurity risk management principles.
โœ… Experience with Tenable Administration, MS Web Defender Administration, Zimperium (Mobile Device) Administration, and Zscaler Administration.
โœ… Familiarity with the Incident Response Lifecycle.

Education

Any Graduate