Company Description
has multiple CONTRACT positions available immediately for Information Security Engineer to join our customer in Phoenix AZ. This is an ONSITE position. Please find below additional details about this job. Kindly respond with your most up to date resume if you would like to pursue this opportunity. Client is considering only LOCAL CANDIDATES for this position.
Job Description
The Information Security Engineer is responsible for reviewing and providing oversight for network and mainframe security hardware and software to ensure the protection of DOR’s information assets from unauthorized use, modification, or destruction.
The individual in this position will be able to apply their advanced knowledge and technical skills in network security and will exercise latitude for independent judgment and discretion within established policies and procedures. The Information Security Engineer will approach assignments with considerable creativity and innovation.
The purpose of this position is:
- To provide security oversight ensuring confidentiality, integrity, and availability(CIA) for DOR information and on-going security auditing;
- To evaluate IT infrastructure and applications as they relate to security architecture and design;
- To make recommendations on the design, selection, and modification of appropriate hardware and software to meet security requirements of network and mainframe systems and information processing needs;
- To participate in projects relating to security and technical considerations and deployment activities;
- To support IT disaster recovery documentation, testing and review; and to assist with DOR Information Security policies and standards creation and review.
Qualifications
- A Bachelor’s degree in Information Technology or related field, along with approximately five (5) additional years of relevant IT professional experience; OR, approximately 9 years of relevant IT professional experience
- Approximately 5-7 years of progressive Information Technology in physical, application networking security policies, procedures and practices
- Comprehensive in depth Unix/Linux knowledge and administration experience
- Direct experience creating and participating in a comprehensive Risk Assessment program
- Experience in performing computer system penetration testing and risk mitigation
- Experience with LAN/WAN network topologies, protocols, file/application servers, encryption technologies and the network operating hardware and software, FTP, Active Directory, VPN technologies (such as MPLS, IPSEC, etc.) IIS and ISA Proxy Server
- Demonstrated experience in firewalls, IDS/IPS systems, event correlation systems, content filters, SYSLOG and SNMP
Additional Information
- "All your information will be kept confidential according to EEO guidelines". - All candidates who are authorized to work in US are encouraged to apply. - Candidates must clear the Background check prior to commencing the assignment.
SOURCER ASSIGNED:
Pete Tylor; Email: pete dot tylor at idealforce.com
Disclaimer :
The above statements are intended to describe the general nature and level of work being performed by people assigned to this classification. They are not to be construed as an exhaustive list of all responsibilities, duties, and skills required of personnel so classified. All personnel may be required to perform duties outside of their normal responsibilities from time to time, as needed.