Responsibilities:
- The successful candidate shall have a strong command of security operations, intrusion defense, firewalls, security event management, Denial of Service detection/mitigation, document processing, meeting management, scheduling and related support tasks.
- Further, the candidate must have a strong commitment to learning technology and processes.
- Additionally, the candidate should have a command of secure configuration, incident investigation, system hardening, and similar security technology.
- The Information Security Administrator is responsible for documentation including reports, presentations, run books, incident reviews and related items. Experience with audits and assessments with an emphasis on SAS70/SSAE16, FFIEC, PCI DSS, etc. are needed.
- Finally, an ideal candidate will have a background which includes forensics, DR and BCP.
Certifications (desired but not required):
CompTIA Security+, CISA, McAfee, Checkpoint, Cisco (security), CISSP.
Technologies (in order of importance):
ArcSight, Linux security, Juniper SSL VPN, Anti-virus, Intrusion Detection/Prevention - Snort, ISS, Cisco 42xx/ISR IPS Modules, TippingPoint, Windows, IDM/SSO. Demonstrated ability with system hardening, investigation, root cause analysis, performance tuning and alert automation/log parsing.
System Security – Solaris, Linux, AIX, HPUX, Windows, AS400. Skilled in vulnerability assessment and deployment of countermeasures including tripwire and iptables/ipchains.
Application Security - WebInspect, AppDective. Interest in application security testing including SQL injection analysis and mitigation.