Home

Hybrid - Cyber Security - District of Columbia (Only local to MD, VA And DC) at Columbia, Alabama, USA
Email: [email protected]
From:

Usha Geethari,

StellarIT Solutions

[email protected]

Reply to:   [email protected]

Hi,

This is Usha form Stellar IT Solutions! You intrigued us in your profile; hence I have a Great Opportunity for you with our direct client so kindly view the below job description and let me know your interest to proceed further.

Title: Cyber Security (Certification required)

Location: District of Columbia

Duration: Long Term

*Hybrid position - Required to be on-site every Thursday - Tri-State area candidates preferred* 

Complete Description:

Duties and Responsibilities:

1.As part of the OCFO technology team, the Security Specialist (Infrastructure Group) will be maintaining and monitoring day to day operation of the OCFO IT infrastructure Security.

2.The IT Consultant will help and perform monitoring, maintenance, and security IT infrastructure (physical, virtual and cloud).

3.IT consultant will perform OS, security and application upgrades of servers and network to keep them up to date.

4.IT consultant will develop, implement, maintains, and enforce documented standards and procedures for the design, development, installation, modification, and documentation of assigned systems.

5.IT consultant will plan, coordinate, and monitor project activities for OCFO Infrastructure group and duties as assigned.

6.Onboarding of Logs from various log sources into SIEM (e.g.: Firewalls, Routers, Switches, Applications, etc.)

7.Log analysis of Firewall, AD, Switches, another deployed security products Knowledge of vulnerability assessment tools to identify and mitigate issues.

8.Perform Vulnerability assessment and having hands-on experience with Vulnerability Management tools like Qualys and Nessus

9.Co-ordinate with Patching team and assist them with patching, which should not be limited to software updates.

10. Having strong understanding of different security protocols.

11. Respond to escalation calls from the Help desk, Desktop support, and other teams to debug and resolve security and perform maintenance.

12. Understands security troubleshooting processes and cooperates with another team.

13. Assists Service Desk technicians as needed with Tier I and Tier II troubleshooting and patching of desktop systems, software (MS Office, Java, Adobe), printer issues, and server related issues as needed. Provides trouble-shooting assistance on production and non-production supported systems.

14. May recommend methods and techniques for obtaining solutions.

15. Initiates preventive maintenance for the technical system.

Responsibilities

1.Determines enterprise information assurance and security standards.

2.Develops and implements information assurance/security standards and procedures.

3.Coordinates, develops, and evaluates security programs for an organization. Recommends information assurance/security solutions to support customers' requirements.

4.Identifies, reports, and resolves security violations.

5.Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.

6.Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures.

7.Performs analysis, design, and development of security features for system architectures (not mandatory but good to have)

8.Analyzes and defines security requirements for computer systems which may include mainframes, workstations, and personal computers (not mandatory but good to have)

9.Designs, develops, engineers, and implements solutions that meet security requirements (not mandatory but good to have)

10. Provides integration and implementation of the computer system security solution.

11. Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems.

12. Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.

Qualifications

1. 5-7years of experience developing, maintaining, and recommending enhancements to IS policies/requirements (Required)

2. 5-7years of experience performing vulnerability/risk analyses of computer systems/apps (Required)

3. 5-7years of experience identifying, reporting, and resolving security violations(Required)

4. Patching Servers both Windows and Linux (Required)

5. Patching Desktop Windows 10/11 (Required)

6. Understanding of VMware environment (Desired)

7. Production support (Required)

8. Server and Desktop troubleshooting (Required)

9. Basic understanding of industry standards like NIST, CIS, COBIT, ISO 27001 (Desired)

10. SIEM Logging, Monitoring and Configuration (Desired)

11. Cloud experience (MS Azure) (Desired)

Education

1. Bachelors Degree in IT or related field or equivalent experience (Required)

2.Security+, CISM, CISA and other certifications (Preferred)

Skill

Required / Desired

Amount of Experience

Consultants Experience

Experience developing, maintaining, and recommending enhancements to IS policies/requirements

Required

6 Years

Experience performing vulnerability/risk analyses of computer systems/apps

Required

6 Years

Experience identifying, reporting, and resolving security violations

Required

6 Years

Experience patching servers both Linux and Windows

Required

Experience patching Desktop Windows 10 / 11

Required

Understanding of VMWare environment

Required

Basic understanding of industry standards like NIST, CIS, COBIT, ISO 27001

Desired

SIEM Logging, Monitoring and Configuration

Desired

Cloud experience (MS Azure)

Desired

Bachelor's Degree in IT or related field

Required

CompTIA Security+ or CISSP or other security certifications

Desired

Thanks & Regards,

Usha R

Senior Talent Acquisition 

https://www.linkedin.com/in/usha-g-3a2ba2101

Work: 240-774-0203|

Email: [email protected] 

Rockville, MD | McLean, VA | Palo Alto, CA

StellarIT.com  | StellariDeaLabs.com

Keywords: active directory rlang information technology microsoft California Colorado Maryland Virginia
Hybrid - Cyber Security - District of Columbia (Only local to MD, VA And DC)
[email protected]
[email protected]
View all
Mon Apr 29 23:31:00 UTC 2024

To remove this job post send "job_kill 1351389" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 2

Location: ,