Computer Security Specialist Job Description
Computer Security Specialist Duties & Responsibilities
To write an effective computer security specialist job description, begin by listing detailed duties, responsibilities and expectations. We have included computer security specialist job description templates that you can modify and use.
Sample responsibilities for this position include:
Computer Security Specialist Qualifications
Qualifications for a job description may include education, certification, and experience.
Licensing or Certifications for Computer Security Specialist
List any licenses or certifications required by the position: II, IAT, CISSP, CE, CSA, SSCP, GSEC, GICSP, CCNA, IA
Education for Computer Security Specialist
Typically a job would require a certain level of education.
Employers hiring for the computer security specialist job most commonly would prefer for their future employee to have a relevant degree such as Bachelor's and Associate Degree in Computer Science, Engineering, Education, Information Security, Information Technology, Technical, Science, Mathematics, Arts, Business/Administration
Skills for Computer Security Specialist
Desired skills for computer security specialist include:
Desired experience for computer security specialist includes:
Computer Security Specialist Examples
Computer Security Specialist Job Description
- Update information in DoD and Army using compliance tools and providing an updated report on status of all systems that do not meet compliance
- Provide feedback on Information Assurance Vulnerability Management (IAVM) to Systems Chief regarding IA policies and procedures
- Research Army and Policy documents and providing guidance to system owner, to include documenting any changes to policies and procedures
- Provide automated scan information using approved DoD tools to check the security posture of assets
- Review System Plan of Action and Milestones (POAMs) to ensure proposed solutions from system integrators are appropriate and address vulnerabilities and providing updates on the POAMs
- Oversee and monitor Risk Management Framework (RMF) policies and procedures with expert knowledge in the Enterprise Mission Assurance Support Service (eMass)
- Work closely with the Command Cyber Security Office to ensure that all Systems security requirements are compliant
- Provide expert knowledge and oversight for Cyber Security Inspection Audits and in the Ports, Protocols & Management Systems (PPMS)
- Assist with SACO tasking and oversight to System Whitelist in Army Registry of Networks and Layer-3 Devices (ARNLD)
- Monitor various security tools to identify potential incidents, network intrusions, and malware events
- Eight (8) years of Systems Engineering Management and C4I Systems-of-Systems design and integration experience
- Bachelor’s Degree from an accredited college or university in Computer Science required
- Must be familiar with standard concepts, practices, and procedures within Computer Security Systems
- Bachelor’s Degree from an accredited college or university in Computer Science or related field of study required
- Must have experience performing risk analyses and mitigating findings
- Must have knowledge of FISMA, NIST, HHS, and OMB guidelines
Computer Security Specialist Job Description
- Generate trouble tickets and performing initial validation and triage to determine whether incidents are security events
- Follow established incident response procedures to ensure proper escalation, analysis and resolution of security incidents
- Analyze and correlate incident event data to develop preliminary root cause and corresponding remediation strategy
- Provide technical support for new detection capabilities, recommendations to improve upon existing tools/capabilities
- Perform host and cloud forensics investigations across Asian countries using Forensics methodology and recording chain of custody for legal purposes
- Respond to security incidents and write reports
- Train teams for the first level of digital investigation
- Write documentations and SoPs
- Developing tools
- GCFA, GCWN, GCIH, OSCP, OSCE, OSWE, GCIA, GMON, GREM, GSE
- CISSP Certification or Level III equivalent
- Certified on CISSP, Security + and Network +
- Experience working with Government personnel to secure accreditation approval of major systems installations specifically RF-ITV and TC-AIMS II
- Expert knowledge in the Enterprise Mission Assurance Support Service (eMass)
- Two years supporting DoD Command and Control Information Technology systems (with preference for experience with Chemical, Biological, Radiological and Nuclear (CBRN) Information Technology programs
- Seven years of experience in the Information Technology field
Computer Security Specialist Job Description
- Ensures appropriate processes are in place and followed so that systems are compliant with applicable policies, procedures, contracts and regulatory requirements by monitoring, assessing and implementing security procedures
- Analyzes security events and records to determine if security incidents have occurred
- Provides consultation and advice on security issues
- Participates in and/or leads incident response teams, and can work independently
- Defines, develops and deploys IT processes and computing standards using process management methods
- Develops policies and provides oversight for computing and information security driven by regulation, law or contracts
- Collects, preserves and documents information to assist in investigations in order to determine facts, establishes non-repudiation and, when directed, preserves the chain of custody
- Participates in and/or leads the development of training materials and processes regarding computing and information security
- Designs, tests and deploys network security solutions and components by ensuring security requirements are implemented
- Integrate monitoring of systems for security issues, including the review of continuous diagnostic and monitoring information received from various tools
- Available for travelling among South East Asia countries in order to perform digital forensics investigations (20% max)
- Available for working on-call and on occasion overtime
- Degree in Computer Science or equivalent practical experience
- Degree in Digital Forensics
- Good knowledge of Cloud Infrastructure and security services
- Good knowledge of mobile forensics
Computer Security Specialist Job Description
- Conduct meetings to report on development status, configuration changes, risks, issues, security mitigation, security assessments, privacy assessments, lessons learned, and any potential new work identified
- Evaluate IT security of new products and applications that are proposed or selected for the environment - advising on risk, policy and compliance issues
- View, assess, and report on the adherence of systems and other products developed and operated against accessibility, usability, security, privacy, and functionality requirements and controls
- Mitigate and remediate accessibility, usability, security, privacy, and functionality weakness and vulnerabilities
- Assist the CISO in reviewing documentation required for Authority to Operate Certifications
- Support agency reporting and submission of security documents and reports through respective systems
- Provide support for the development and maintenance of system security and privacy documentation
- Develop and maintain a template library of checklists, sample documents, and reports on security compliance
- Develop secure systems that are accessible and comply with Section 508 requirement
- Administering the Coalition Electronic Key Management (CEKMS) and Regional COMSEC Account
- Good knowledge of Active Directory security
- Experienced with remote forensics tools such as OSquery, GRR Rapid Response, etc
- Mandarin working proficiency (talk, read)
- Experience with DoD Cybersecurity policies and procedures
- Experience with analyzing security policies
- Bachelor of Science degree in Information Technology, IT Security, Network Systems Technology or related field
Computer Security Specialist Job Description
- Documenting quarterly inventories and inspections of all stored COMSEC equipment, KEYMAT documents, and materials using the NSA Central Office of Record (COR) website
- Performing routine destruction of COMSEC materials when required by NSA COR keying material Controlling Authority (CONAUTH)
- Conducting semiannual inventories by sighting all COMSEC material charged to the account, and reconcile inventory with the Central Office of Record (COR)
- Develop Standard Operating Procedures (SOPs) for all issues concerning COMSEC equipment, KEYMAT, and associated information from coalition countries
- Provide the technical assistant with monthly status reports to include lists of accomplishments and any task issues/problem areas requiring government action
- Provide analysis of cloud cybersecurity architecture, compliance with Federal regulation and policy, and commercial best practices relating to cloud security
- Review, analyze, discuss, and evaluate the implementation of security controls in multiple information system environments, including dynamic cloud services (IaaS, PaaS, and SaaS)
- Evaluate the performance of ongoing security maintenance, for example, continuous monitoring (ConMon) or continuous diagnostics and mitigation (CDM)
- Assess the ability of the service provider to maintain an acceptable security posture/ risk threshold on a monthly basis
- Analyze risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and cyber protection (security architecture) requirements as they relate to the ongoing security risk posture of the system
- 5+ years of experience with Cybersecurity, information assurance, or security practice
- Experience with RMF, ICD 503, NIST 800–53, or NIST 800–82 documentation for system accreditations
- BA or BS degree in Engineering, Science, or Systems Management
- Experience with advanced cyber security tools, network topologies, intrusion detection, PKI, and secured networks
- PII security
- Applies extensive job practices, techniques, standards, principles, theories, and concepts