JD – CODE CS123
Cyber Security Job Responsibilities:
Safeguards information system assets by identifying and solving potential and actual
security problems.
Protects system by defining access privileges, control structures, and resources.
Recognizes problems by identifying abnormalities; reporting violations.
Implements security improvements by assessing current situation; evaluating trends;
anticipating requirements.
Determines security violations and inefficiencies by conducting periodic audits.
Upgrades system by implementing and maintaining security controls.
Keeps users informed by preparing performance reports; communicating system
status.
Maintains quality service by following organization standards.
Maintains technical knowledge by attending educational workshops; reviewing
publications.
Contributes to team effort by accomplishing related results as needed.
Cyber Security Qualifications / Skills:
System administration
Network security
Problem solving
Information security policies
On-call network troubleshooting
Firewall administration
Network protocols
Routers, hubs, and switches
Informing others
Process improvement
Education, Experience, and Licensing Requirements
Bachelor’s degree in Computer Science, Information Systems, or equivalent education or
work experience
Advanced certifications such as SANS GIAC/GCIA/GCIH, CISSP or CASP and/or SIEM-
specific training and certification
Hold DoD-8570 IAT Level 2 baseline certification (Security+ CE or equivalent) at start
date
Advanced understanding of TCP/IP, common networking ports and protocols, traffic
flow, system administration, OSI model, defense-in-depth and common security
elements.
Hands-on experience analyzing high volumes of logs, network data (e.g. Netflow,
FPC), and other attack artifacts in support of incident investigations
Experience with vulnerability scanning solutions
Familiarity with the DOD Information Assurance Vulnerability Management program.
Proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture,
Host-Based Forensics, Network Forensics, and RSA Security
In-depth knowledge of architecture, engineering, and operations of at least one
enterprise SIEM platform (e.g. Nitro/McAfee Enterprise Security Manager, ArcSight,
QRadar, LogLogic, Splunk)
Experience developing and deploying signatures (e.g. YARA, Snort, Suricata, HIPS)
Understanding of mobile technology and OS (i.e. Android, iOS, Windows), VMware
technology, and Unix and basic Unix commands
JD – CODE CS213
Cybersecurity specialist job description
We value our cybersecurity team as the first — and last — line of defense in
protecting our sensitive data from cyberattack. We’re seeking an experienced and
vigilant cybersecurity specialist who can proactively prevent breaches of all sizes,
understand when they occur, and take immediate steps to remediate them. In this
role, the specialist will help keep cybercrime at bay, using expertise and analytics
to monitor our data at all points of contact, ferret out malware and ransomware
events, and recommend solutions for any vulnerabilities. The ideal candidate has
an understanding of cybersecurity standards and certifications, extensive
knowledge of how cybercriminals work, and determination to never allow them
access.
Objectives of this role
Guard all company data, particularly sensitive information, from both
internal and external threats by designing broad defence’s against would-be
intruders
Take the lead in day-to-day monitoring for unusual activities, implement
defensive protocols, and report incidents
Collaborate with other members of the cybersecurity team to develop new
protocols, layers of protection, and other proactive and defensive systems
for remaining ahead of cybercriminals
Maintain documentation of security guidelines, procedures, standards, and
controls
Maintain knowledge of current cybercrime tactics
Responsibilities
Collect data on current security measures for risk analysis, and write
systems status reports regularly
Monitor constantly for attacks and run appropriate defensive protocols if a
breach occurs
Conduct testing to identify vulnerabilities, and collaborate with
cybersecurity team to update defensive protocols when necessary
Configure antivirus systems, firewalls, data centers, and software updates
with a security-first mindset
Grant credentials to authorized users, monitor access-related activities, and
check for unregistered information changes
Help lead employee training to prevent phishing and other forms of
cyberattack
Required skills and qualifications
Three to five years of experience in cybersecurity at a midsize or large
company in our industry
Deep knowledge of IT, including hardware, software, and networks
Meticulous eye for detail and an ability to multitask in a fast-paced
environment
Strong abilities in critical thinking, problem-solving, logic, and forensics
Preferred skills and qualifications
Bachelor’s degree (or equivalent) in information systems, information
technology, or related field
Excellent verbal and written communication skills
Ability to work successfully in both individual and team settings
Ability to think like a hacker in order to stay ahead of threats
JD – CODE CS312
Cyber Security Analyst - Job Description
Description
The Cyber Security Analyst (CSA) is responsible for assisting with the day-to-day
operations of securing the firm’s various information systems. Reporting to the
Information Security Manager, the CSA is tasked with providing technical expertise in
all areas of network, system, and application security. The CSA works closely with the
various teams in the Information Technology department to ensure that systems and
networks are always designed, developed, deployed, and managed with an emphasis
on strong, effective security and risk management controls.
The CSA leads the firm's vulnerability management program, manages the annual
cybersecurity assessments and penetration tests, and researches and reports on
emerging threats, to help the firm take pre-emptive risk mitigation steps. The CSA
effectively correlates and analyzes security events within the context of AEW's
unique environment to proactively detect threats and mitigate attacks before they
occur.
Key Responsibilities
• Proactively monitor the environment to detect and implement steps to mitigate cyber-
attacks before they occur.
• Provides technical expertise regarding security-related concepts to operational teams
within the Information
Technology Department and the business.
• Review, investigate, and respond to real-time alerts within the environment.
• Review real-time and historical reports for security and/or compliance violations.
• Monitor online security-related resources for new and emerging cyber threats.
• Assesses new security technologies to determine potential value for the enterprise.
• Conducts vulnerability assessments of firm systems and networks.
• Manage systems owned by the Information Security Team.
Demonstrable Requirements
• A four-year college degree or equivalent industry training and certifications.
• Three to five years of experience in a security analyst or related position.
• Technical knowledge of enterprise-class technologies such as firewalls, routers, switches,
wireless access
points, VPNs, and desktop and server operating systems.
• Thorough understanding of Microsoft’s enterprise technology platform, including Azure,
Active Directory, SQL,
Office365, and the Windows server and desktop operating systems.
• Proficiency with Windows PowerShell.
• Working experience with the following technology vendors and products: Splunk Cloud,
Rapid7 Nexpose
Vulnerability Scanner, Sophos Antivirus, Varonis DatAlert, ForeScout CounterACT.
• Strong writing skills, as well as the ability to articulate security-related concepts to a broad
range of technical
and non-technical staff.
• Working experience with creating, implementing, and managing a threat hunting program
within a corporate environment.
• Demonstrated experience implementing and/or enforcing security and compliance
frameworks such as NIST, Cobit, and ISO.
• Be a proficient problem-solver that is able to work autonomously.
Desired Qualifications
• One or more of the following certifications: CEH, CISM, CompTIA Security+, CISSP, GSEC
• Experience with managing and securing both on-premise and hosted systems and
applications.
• Experience with application and database security.