0% found this document useful (0 votes)
36 views4 pages

JD - Code Cs123 Cyber Security Job Responsibilities

Uploaded by

jacipa8038
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views4 pages

JD - Code Cs123 Cyber Security Job Responsibilities

Uploaded by

jacipa8038
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

JD – CODE CS123

Cyber Security Job Responsibilities:

 Safeguards information system assets by identifying and solving potential and actual
security problems.
 Protects system by defining access privileges, control structures, and resources.
 Recognizes problems by identifying abnormalities; reporting violations.
 Implements security improvements by assessing current situation; evaluating trends;
anticipating requirements.
 Determines security violations and inefficiencies by conducting periodic audits.
 Upgrades system by implementing and maintaining security controls.
 Keeps users informed by preparing performance reports; communicating system
status.
 Maintains quality service by following organization standards.
 Maintains technical knowledge by attending educational workshops; reviewing
publications.
 Contributes to team effort by accomplishing related results as needed.

Cyber Security Qualifications / Skills:

 System administration
 Network security
 Problem solving
 Information security policies
 On-call network troubleshooting
 Firewall administration
 Network protocols
 Routers, hubs, and switches
 Informing others
 Process improvement
 Education, Experience, and Licensing Requirements

Bachelor’s degree in Computer Science, Information Systems, or equivalent education or


work experience
 Advanced certifications such as SANS GIAC/GCIA/GCIH, CISSP or CASP and/or SIEM-
specific training and certification
 Hold DoD-8570 IAT Level 2 baseline certification (Security+ CE or equivalent) at start
date
 Advanced understanding of TCP/IP, common networking ports and protocols, traffic
flow, system administration, OSI model, defense-in-depth and common security
elements.
 Hands-on experience analyzing high volumes of logs, network data (e.g. Netflow,
FPC), and other attack artifacts in support of incident investigations
 Experience with vulnerability scanning solutions
 Familiarity with the DOD Information Assurance Vulnerability Management program.
 Proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture,
Host-Based Forensics, Network Forensics, and RSA Security
 In-depth knowledge of architecture, engineering, and operations of at least one
enterprise SIEM platform (e.g. Nitro/McAfee Enterprise Security Manager, ArcSight,
QRadar, LogLogic, Splunk)
 Experience developing and deploying signatures (e.g. YARA, Snort, Suricata, HIPS)
 Understanding of mobile technology and OS (i.e. Android, iOS, Windows), VMware
technology, and Unix and basic Unix commands

JD – CODE CS213

Cybersecurity specialist job description


We value our cybersecurity team as the first — and last — line of defense in
protecting our sensitive data from cyberattack. We’re seeking an experienced and
vigilant cybersecurity specialist who can proactively prevent breaches of all sizes,
understand when they occur, and take immediate steps to remediate them. In this
role, the specialist will help keep cybercrime at bay, using expertise and analytics
to monitor our data at all points of contact, ferret out malware and ransomware
events, and recommend solutions for any vulnerabilities. The ideal candidate has
an understanding of cybersecurity standards and certifications, extensive
knowledge of how cybercriminals work, and determination to never allow them
access.

Objectives of this role


 Guard all company data, particularly sensitive information, from both
internal and external threats by designing broad defence’s against would-be
intruders
 Take the lead in day-to-day monitoring for unusual activities, implement
defensive protocols, and report incidents
 Collaborate with other members of the cybersecurity team to develop new
protocols, layers of protection, and other proactive and defensive systems
for remaining ahead of cybercriminals
 Maintain documentation of security guidelines, procedures, standards, and
controls
 Maintain knowledge of current cybercrime tactics
Responsibilities
 Collect data on current security measures for risk analysis, and write
systems status reports regularly
 Monitor constantly for attacks and run appropriate defensive protocols if a
breach occurs
 Conduct testing to identify vulnerabilities, and collaborate with
cybersecurity team to update defensive protocols when necessary
 Configure antivirus systems, firewalls, data centers, and software updates
with a security-first mindset
 Grant credentials to authorized users, monitor access-related activities, and
check for unregistered information changes
 Help lead employee training to prevent phishing and other forms of
cyberattack
Required skills and qualifications
 Three to five years of experience in cybersecurity at a midsize or large
company in our industry
 Deep knowledge of IT, including hardware, software, and networks
 Meticulous eye for detail and an ability to multitask in a fast-paced
environment
 Strong abilities in critical thinking, problem-solving, logic, and forensics
Preferred skills and qualifications
 Bachelor’s degree (or equivalent) in information systems, information
technology, or related field
 Excellent verbal and written communication skills
 Ability to work successfully in both individual and team settings
 Ability to think like a hacker in order to stay ahead of threats

JD – CODE CS312

Cyber Security Analyst - Job Description

Description
 The Cyber Security Analyst (CSA) is responsible for assisting with the day-to-day
operations of securing the firm’s various information systems. Reporting to the
Information Security Manager, the CSA is tasked with providing technical expertise in
all areas of network, system, and application security. The CSA works closely with the
various teams in the Information Technology department to ensure that systems and
networks are always designed, developed, deployed, and managed with an emphasis
on strong, effective security and risk management controls.
 The CSA leads the firm's vulnerability management program, manages the annual
cybersecurity assessments and penetration tests, and researches and reports on
emerging threats, to help the firm take pre-emptive risk mitigation steps. The CSA
effectively correlates and analyzes security events within the context of AEW's
unique environment to proactively detect threats and mitigate attacks before they
occur.
Key Responsibilities
• Proactively monitor the environment to detect and implement steps to mitigate cyber-
attacks before they occur.
• Provides technical expertise regarding security-related concepts to operational teams
within the Information
Technology Department and the business.
• Review, investigate, and respond to real-time alerts within the environment.
• Review real-time and historical reports for security and/or compliance violations.
• Monitor online security-related resources for new and emerging cyber threats.
• Assesses new security technologies to determine potential value for the enterprise.
• Conducts vulnerability assessments of firm systems and networks.
• Manage systems owned by the Information Security Team.
Demonstrable Requirements
• A four-year college degree or equivalent industry training and certifications.
• Three to five years of experience in a security analyst or related position.
• Technical knowledge of enterprise-class technologies such as firewalls, routers, switches,
wireless access
points, VPNs, and desktop and server operating systems.
• Thorough understanding of Microsoft’s enterprise technology platform, including Azure,
Active Directory, SQL,
Office365, and the Windows server and desktop operating systems.
• Proficiency with Windows PowerShell.
• Working experience with the following technology vendors and products: Splunk Cloud,
Rapid7 Nexpose
Vulnerability Scanner, Sophos Antivirus, Varonis DatAlert, ForeScout CounterACT.
• Strong writing skills, as well as the ability to articulate security-related concepts to a broad
range of technical
and non-technical staff.
• Working experience with creating, implementing, and managing a threat hunting program
within a corporate environment.
• Demonstrated experience implementing and/or enforcing security and compliance
frameworks such as NIST, Cobit, and ISO.
• Be a proficient problem-solver that is able to work autonomously.

Desired Qualifications
• One or more of the following certifications: CEH, CISM, CompTIA Security+, CISSP, GSEC
• Experience with managing and securing both on-premise and hosted systems and
applications.
• Experience with application and database security.

You might also like