In this role, the selected candidate will configure systems following Department of Defense (DoD) Certification and Accreditation (C&A) guidance and perform C&A assessments to evaluate compliance with established cyber security policies and regulations.
The successful candidate will be responsible for implementing, maintaining and administering an enterprise-class network infrastructure, including LAN, MAN and WAN services for Solar Turbines Incorporated. The position will support the network requirements of in-house and purchased applications and infrastructure.
In this role, you will be responsible for
under the general guidance of the manager and/or director, information security, the information security engineer will provide support in the operational aspect of it system security designs, policies, and solutions in conjunction with the security architects.
In this role, the selected candidate will monitor, detect, and take immediate action on events and incidents as they occur on the network; automate analysis activities via scripting and integration of multiple existing tools.
In this role, you will prepare detailed specifications, requirements, scope documents and logic flowcharts for the development and implementation of the most complex application programs and modifications.
The Cloud Security Analyst will be responsible for understanding the customers security requirements, and then implementing security solutions that 1) meet the customers requirements, and 2) align with the standard managed cloud security policies and procedures. The role requires expertise in ISO27001, SSAE16, PCI, HIPAA security standards .
In this role, the candidate will perform daily operations and monitor events from multiple sources including, but not limited to, SIEM consoles, network and host based intrusion detection systems, firewall consoles, system logs (Unix and Windows), applications, databases, and other security information monitoring tools.
In this role, you will perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy.
In this role, the selected candidate will develop and maintain Security infrastructure solutions for Large Complex Multivendor Network Environments; provide troubleshooting support for complex enterprise security environments.