Job Details

Position: Information Security Consultant (Ref: 8293)
Location: Augusta, ME 04333 USA
Duration: 1 Years 4 Months 5 Days - Contract
Openings: 1
Deadline: 02/26/2021
Pay Rate:Login

Description:

We are seeking an Information Security Consultant who is a vital member of the Information Security Office, implementing policies and providing consultation on a number for security matters. The candidate will help implement the security controls to strengthen the security posture. The candidate must have strong security knowledge about how the security tools fits into the broader security program. The candidate will work with multiple parties to establish processes and implement measures to support the protection the network and devices. This position will advise the Chief Information Security Officer on policies and work independently on security assignments. This position will work directly with the Chief Information Security Officer. This position will work with other information security resources and managers to address security architecture, monitoring and responding to incidents, application testing, data collection, and projects.

Required / Desired Skills

  • Expertise understanding security architecture and design based on industry best practices. (Required 5 Years)
  • Expertise understanding security tools and all its features to effectively use the tools to monitor and contain security threats. (Required 5 Years)
  • Expertise understanding in building and analyzing security controls and best practices. (Required 5 Years)
  • Ability to work independently and with a team in establishing rules/policies. (Required 5 Years)
  • Assist in implementing security solutions within the existing infrastructure. (Required 5 Years)
  • Ability to effectively work with members on the security team to document polices, processes, and provide analysis reports. (Required 5 Years)
  • Ability to lead and assist in security incidents to recognize and contain common attack vectors such as, recon scans, botnet, malware, command, and control activity (C2), worms, trojans, and viruses. (Required 5 Years)
  • Ability to use correlation tools such as log aggregation tools or a SIEM for analysis. (Required 5 Years)
  • Expertise security knowledge in designing, implementing, administering, and troubleshooting infrastructure devices, including firewalls, routers, switches, servers, wireless access points and controllers, and monitoring applications. (Required 5 Years)
  • Extensive knowledge and experience in risk management and project management practices. (Required 5 Years)
  • Previous government experience and interacting with multiple business lines and technologies to address desired outcomes. (Highly Desired 1 Years)

copyright @ www.ProfessionalTechIntegration.com.2011 All rights reserved
Professional Tech Integration, Inc., Computers  Sys Designers & Consult, Norcross, GA