Security Technology Specialist Job Description
Security Technology Specialist Duties & Responsibilities
To write an effective security technology specialist job description, begin by listing detailed duties, responsibilities and expectations. We have included security technology specialist job description templates that you can modify and use.
Sample responsibilities for this position include:
Security Technology Specialist Qualifications
Qualifications for a job description may include education, certification, and experience.
Licensing or Certifications for Security Technology Specialist
List any licenses or certifications required by the position: CISSP, COMSEC, LCMS, GIAC, CCSP, IA, III, IAM, DOD, CAMC
Education for Security Technology Specialist
Typically a job would require a certain level of education.
Employers hiring for the security technology specialist job most commonly would prefer for their future employee to have a relevant degree such as Bachelor's and Master's Degree in Computer Science, Education, Engineering, Information Technology, Graduate Education, Mathematics, Information Systems Management, Statistics, Information Science, Technology Management
Skills for Security Technology Specialist
Desired skills for security technology specialist include:
Desired experience for security technology specialist includes:
Security Technology Specialist Examples
Security Technology Specialist Job Description
- Compiles and delivers a multitude of valuable data to internal customers
- Serves as liaison with other IMM departments to provide information in response to RFI, RFP and RFB
- Works with operations and account managers to potentially customize service delivery to IMM clients
- Conduct investigations of cybersecurity violations and administers Unauthorized Disclosure of Classified Information (UDCI)/spillage program
- Ensure measures, policies, and procedures used to support the security integrity of the network comply with applicable Command security directives/policies
- Evaluate information system security, Information Assurance Vulnerability Management (IAVM), and computer network defense (CND) procedures
- Lead the team in terms of assigned tasks and workload, distributing work assignments among subordinates, taking into consideration the types of assignments, skills of employees, and employee specializations to safeguard network integrity
- A Technical Degree which is mandatory for this role such as Bachelor or Master Degree in Computer Science or related discipline, or have an equivalent combination of education and experience in information security within a large corporation
- Completed or be working towards a relevant professional qualification, for example, CISSP or a Certificate III in Investigative Services
- Proven ability to follow global established standards in digital evidence acquisition and handling, experience with conducting digital investigations and incident responses and experience in managing insider threats and cyber and data exfiltration incidences
- Work closely with Client Confidentiality Officer office & functions in supporting Confidential Information Protection development for engagement
- Review and update firm security policies and procedures
- Develop and prepare materials for specific client security requirement awareness update
- Participate in Risk Management process
- 4 years IT Security working experiences in multinational company
- CISA, CISSP, or other security related qualifications
Security Technology Specialist Job Description
- Follow information security policies, methods, standards, Federal Information Security Management Act (FISMA)/National Institutes of Standard and Technology (NIST) standards and practices to organizational information systems, IT reference materials and interpret regulations
- Implement security controls, perform ongoing maintenance and prevent, detect, analyze and respond to security incidents
- Conduct risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs
- Communicate with Information Security Officer, and other IT personnel within the organization and organizational staff
- Help coordinate the implementation of security programs across all agency platforms
- Assist with Active Directory access and Group Policies, Internet intrusion detection, Internet filtering, and monitoring of employee access, virtual private networking (LAN/WAN) security
- Assist and participate with the Senior IT Specialist as an advisor in projects to enhance or develop new IT systems, or to study the feasibility of acquiring new technology
- Mitigate security vulnerabilities and prepare responses to audit recommendations from the Office of Inspector General and other regulatory agencies (FISMA, OMB, NIST) concerning IT security
- Remain current on the latest development in the IT field and attends vendor sponsored training on new security systems deployed by the agency
- This position is located in the Army Cyber Operations and Integration Center (ACOIC), US Army Cyber Command (ARCYBER)
- Familiar with IT infrastructure operations in the areas of Enterprise Server Administration (Windows)
- Team-worker, self-motivated, independently work with less supervision and under pressure
- North Chicago, IL
- Business travel for this position may be up to 10% of duty time and may require frequent overnight travel away from normal duty station
- This position requires a non-critical sensitive Secret security investigation
- This position requires you to be able to obtain and maintain updated certifications per DoD Directive 8140.01, specifically CEH (Certified Ethical Hacker) and CCNA (Cisco Certified Network Administration) certification within six months of hire
Security Technology Specialist Job Description
- Serve as an Defensive Cyber Operations IT Specialist Incident Handler as part of the 24/7 watch operations
- Uses comprehensive knowledge of entire Cyber Threat Operations to track ongoing cyber threat directed against Army to ARCYBER leadership
- Coordinates with other watch member and sections within the Army Cyber Operations and Integration Center (ACOIC) to insure coordination of situational awareness of global cyber threats is current
- Provide guidance, support and technical expertise to the theater commands constituency on hardware/software required to bring the theater system into regulatory compliance
- Respond to network/system breaches
- Supports assigned products by responding independently to client inquiries and resolving the most complex issues
- Respond to all IT security incidents, alerts, and advisories, and implements countermeasures as directed by DOD, DA policies
- Manage the purchase of and administration functions for a variety of specialty hardware and security software, data entry software, and enterprise management software modules
- Serve as COMSEC custodian, COMSEC Account Holder, Communications Security Logistics Agency (CSLA) management officer, and project lead on a wide variety of network infrastructure and automation security projects and studies with an emphasis on security with the responsibility to submit Request for Change (RFC) and Internet Protocol (IP) Firewall Exemptions for COMSEC equipment
- Provide COMSEC support in the issuance of Cryptographic Keys, Sub-Hand receipts, and Sensitive Compartmented Information (SCI) to U.S. , Allied, and multinational partner units participating in 7th ATC training exercises
- See "Other Requirements" section below
- Must be able to obtain and maintain updated certifications per DoD Directive 8570.1-M
- Must be able to obtain and maintain a Top Secret security clearance and eligible for access to sensitive compartmented information
- This position requires possible overtime on short notice to include nights, holidays, and weekends in support of related mission requirements
- Must submit to pre-employment and random drug testing in compliance with the U.S. Army Drug Abuse Testing Program requirements
- Minimum of 3 years of information security related work and scripting experience (preferably Python, VBScript, PowerShell, and/or Bash)
Security Technology Specialist Job Description
- Drive implementation of security controls in platforms in technology teams, leveraging the embedded Security Engineering team in Technology Risk Advisory
- Conduct Red-Team operations and provide remediation assistance
- Evaluates, defines and provides recommendations addressing computer security architecture and infrastructure to address new requirements, emerging advanced network technologies, and changes to communications and IT operations and business processes
- Manages all aspects of communications security and the development, implementation, interpretation, accreditation, risk management and maintenance of detailed communications security policies, plans, programs, standards and criteria ensuring a successful communications security program
- Represents AFRICOM concerning all theater and coalition COMSEC related matters including operations, policy and planning issues on management reviews and assistance visits at the headquarters, components, interagency and at other command-related organizational locations throughout the theater
- Develops, acquires and implements coalition networks and systems that provide capabilities and build capacity with partner nations and U.S. forces
- Maintains and operates the local COMSEC management system (LCMS), CEKMS, the management client (MGC) key management infrastructure (KMI) system, simple key loader (SKL), secure telephones, inline network encryptors and a variety of other cryptographic devices
- Performs end to end application, web, mobile and network penetration tests using both automated and manual techniques
- Analyse business requirements and security solutions to deliver business appropriate levels of protection
- Primarily responsible for application security but with a good working knowledge of other security domains (Cryptography, Identity and Access Management, Threat and Vulnerability Management, Infrastructure and Networks and Auditing, Logging and Compliance)
- Employee must be certified in accordance with DOD 8570.1 Information Assurance Manager (IAM Level III), or be able to obtain certification within six months of start of employment
- Employee must maintain military driver's license and fulfill / comply with requirements associated with assignment in overseas location
- All standard government benefit programs apply
- Males born after 12-31-59 must be registered for Selective Service
- Knowledge in identity and access management (access control and provisioning, theft tactics)
- Knowledge in network architecture and infrastructure components (Carrier-based network routers and switches, IPv6
Security Technology Specialist Job Description
- Proactively monitor emerging threats and security technologies and contribute to Worldpay security technology roadmap accordingly
- Develop and manage the delivery of technical security standards and secure configurations, along with related documentation or policies, processes and procedures
- Ensure security is integrated into the global payment applications critical or sensitive business applications
- Act as Security Subject matter Expert (SME)
- Coordinate and support delivery of security solutions from inception, proof of concept, testing, and implementation and hand over to Security Operations
- Engage with enterprise architects to ensure the security architecture is aligned with the business and security strategy
- Ensure that any strategy set within this Security function, adheres to the Corporate Security Policy Compliance standards such as PCI DSS, PA DSS, DPA, FSA, SAS70, ISO/IEC 27001 and SOX where relevant
- Familiarity with architectural and operational processes industry best practices such as TOGAF, SOGP, SABSA, ITIL, Cobit and ISO/IEC 27001
- Familiarity with Threat and Vulnerability management programs, ensuring that emerging weaknesses and risks are analysed and mitigated in a timely manner
- Cryptography knowledge including understanding of PKI, Certificate and Key Management Processes
- Associates of Science degree in the field of Computers, Engineering, or Mathematics preferred
- IAST experience
- Expert systems experience with a product or technical area
- Minimum 8+ years experience in application design, architecture and development
- Hampton, VA 1 vacancy
- Successful completion of a security investigation will be required