Security Specialist-NC-AOC-Need local candidate at Raleigh, North Carolina, USA |
Email: [email protected] |
From: Nagajyoti, INNOZA TECH LLC. [email protected] Reply to: [email protected] Position: Security Specialist- Location: Raleigh NC Duration: 12 Months Plus Client: NCAOC ****The manager has a strong preference for local candidates. The work will be 100% remote. However, in the event of a major data center upgrade, best practices would say for the resource to be on site in the event of a catastrophic failure requiring a direct connection. In a rare instance, they may have a meeting where the candidate would need to be on site, but no more than once or twice a year. Scope Of Work: No. 1 40% Security Operations and Network Operations (SOC): Responsible for the Weekends and Holidays Midnight to Noon, (12:00 AM 12:00 PM), and two weekdays, 12:00 AM 9:00 AM, operations and maintenance of the NCAOC Security Operations Center Security Posture. Responsible on Weekends and Holidays to respond to Network Operations Center priority one circuit outages. Responsible for creating, triaging, updating, and seeing closure of Security Operations Incident, Request, and Enterprise Change Management tickets. Monitors and maintains Firewalls and corresponding management tools (FMC) ASDM), Intrusion Prevention Systems (IPS), Vulnerability Management (VM), Cisco Umbrella domain name security, ISE network Access Control, Posturing, and Profiling, IPsec VPN tunnels, AnyConnect remote users and security module, Third Party Partner Security Incident and Event Manager (SIEM), and other network and cloud security tools. Use tools (Wireshark and interface captures, and log searching) to assist in troubleshooting network, device configuration, and network security related problems. Responsible for firewall cleanup processes, tasks, and learning firewall tools to assist in performing these processes and tasks. Follow and maintain SOC process and technology documentation. Open and work to closure vendor TAC cases, mostly Cisco, to resolve incidents and device issues. Provide reports and metrics for the Operations and Administration Manager as requested. Interface with all other TSD technical teams in initiatives and activities the require Security Operations Center resources. No. 2 20% Network Security and Cybersecurity: Monitor and respond to Third Party Partner initiated security investigations. Provide support of the established Incident Response Policy from beginning alert and investigation discovery through recovery to closure. Subscribe to and monitor Security Product Advisories and Cybersecurity Organization Bulletins researching and ensuring coverage of security device risks and Common Vulnerability Enumerations (CVE) Update PSIRT/CVE spread sheet to report progress and coverage of Security Product Advisories and Cybersecurity Organization Bulletins. Monitor and Maintain the IPS signatures, Block lists, URL reputation lists, and malware file lists to ensure latest security recommendations are implemented. Use monitoring and security diagnostic tools to threat hunt for network and device vulnerabilities, security risks and potential threats. Research trends to assist the Security Operations team in staying up to date on industry best practices and current Cybersecurity trends, tools, techniques, and procedures. No. 3 30% Network Patching, Upgrading, and Maintenance: Evaluate, plan, and implement network devices, (switches, routers, management tools, etc.) and network security devices and tools (firewalls, IPS, ISE, etc.) upgrades and patches on a monthly and as needed schedule. Coordinates with various TSD teams in the evaluation, planning and implementation of patching, upgrading, and maintenance. Update patching spread sheet to reflect historic and current versioning. Uses software tools to manage patching, upgrading and maintenance of network and security devices (Visio, Microsoft Office, etc.) No. 4 10% Security Industry and Product Research and Training Attend, classes, seminars, webinars, conferences, training sites, and research product documentation, to enhance professional development and to progress in the field of Network and Cybersecurity trends and developments. Use AOC provided resources to work toward Security Profession Certificates, (Cisco CCNA, routing switching, CCNA Security, CCNP Security, CISSP) Knowledge, Skills and Abilities: Knowledge: Knowledge of enterprise network security technologies: Cisco FTD and ASA firewalls, IPS, FMC, IPsec tunnels, AnyConnect client, Cisco ISE, Cisco Umbrella, Third Party SIEM, DNS, VLANS, NAT Cisco Secure Endpoint (AMP), Load Balancing IP/Domain/URL security intelligence sources (virus total, TALOS, etc.) Knowledge and or possession of Security Profession Certificates, (Cisco CCNA, routing switching, CCNA Security, CCNP Security, CISSP) is preferred but not required. Knowledge of NCAOC security policy and Criminal Justice Information System (CJIN) policies is preferred but not required. Skills: Skills in: enterprise security technology; fundamental knowledge of the following, IPsec, IPS/IDS Snort Engine, SIEM, Identity Services Engine (ISE), Vulnerability Management, Access Control/AAA; networking fundamentals in the areas of enterprise network topology, routers, switches, servers, NAT, DNS; TCP/IP architecture and functionality, Wireshark and interface captures, and log searching to assist in troubleshooting configuration and network security related problems. Abilities: Ability to: plan and manage complex projects independently and with a team; communicate effectively with users to determine and resolve problems; communicate technical information to lay persons; interpret and follow established employment and policies; produce highly technical documents; consider the implications of new technology implementations; balance the application and system access business needs of users with network security protections. SKILLS Configuration and administration of Cisco ASA Firewalls Configuration and administration of Cisco FTD Firewalls Fundamental knowledge of the following, IPsec, IPS/IDS Snort Engine, SIEM, Identity Services Engine (ISE), Vulnerability Management Fundamentals in the areas of enterprise network topology, routers, switches, servers, NAT, DNS; TCP/IP architecture and functionality Works independently to accomplish short and long term project goals with clear and concise communication to team members and management Keywords: access management North Carolina |
[email protected] View all |
Sun Feb 05 14:21:00 UTC 2023 |