This position is a hands-on role that involves configuration and tuning of security devices, analysis of network incidents, web threats, security architectures, new technology designs, and other potential areas where security is needed.
You will assist the sales/BD team with technical knowledge, presentations as the subject matter expert on how a proposed solution meets and exceeds customer requirements. Occasional travel is required.
Responsible for working with the Government Information Systems Security Officer (ISSO) on a variety of tasks, projects, and initiatives to satisfy requirements of information security policies and procedures as they relate to CBP OIT systems.
Design and implement network infrastructure based on business requirement and industrial best practice in a cost effective manner. Evaluate, test and recommend new technology that will increase network performance and reliability.
The Sr. Cyber Security Engineer will perform incident detection and analysis to contribute to the customers overall Computer Network Defense (CND) capability; make containment, eradication, and recovery recommendations for detected incidents; and properly report incidents by following the US-CERT incident reporting guidelines, and participate in other communication and information sharing initiatives as necessary.
Designs and plans network communications systems. Provides specifications and detailed schematics for network architecture. Provides specific detailed information for hardware and software selection, implementation techniques and tools for the most efficient solution to meet business needs, including present and future capacity requirements.
Classify and prioritize the risk of new vulnerabilities according to the specifics of company environment's risk level, mitigating factors, and assessment of the impacts of internal and external threats.
The Senior Technical Security Engineer position is within AOL's IT Security group whose mission is to deliver information security solutions and services to protect AOL information assets, computing infrastructure, applications and data.
Coordinate the deployment of file integrity monitoring (FIM) agents within client environment and work with client and 3rd party security vendor to configure the FIM agent for monitoring of sensitive files and folders, and ensure centralized reporting.