In this role, the selected candidate will monitor, detect, and take immediate action on events and incidents as they occur on the network; automate analysis activities via scripting and integration of multiple existing tools.
The successful candidate will be responsible for implementing, maintaining and administering an enterprise-class network infrastructure, including LAN, MAN and WAN services for Solar Turbines Incorporated. The position will support the network requirements of in-house and purchased applications and infrastructure.
In this role, the selected candidate will monitor, audit, secure and protect business critical operational data, systems and processes within these standards while also understanding the business drivers that exist within the enterprise.
In this role, you will perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy.
In this role, the selected candidate will collaborate with internal IT and Security staff to establish and enforce IT security best practices, information protection objectives, process improvements and effective IT security controls.
In this role, you will administer network security program including event detection, post mortem analysis and recommending process improvements. He / She will also maintain hardware, software and network firewalls and encryption protocols.
The Cloud Security Analyst will be responsible for understanding the customers security requirements, and then implementing security solutions that 1) meet the customers requirements, and 2) align with the standard managed cloud security policies and procedures. The role requires expertise in ISO27001, SSAE16, PCI, HIPAA security standards .
In this role, the selected candidate will configure systems following Department of Defense (DoD) Certification and Accreditation (C&A) guidance and perform C&A assessments to evaluate compliance with established cyber security policies and regulations.
In this role, the selected candidate will provide timely and accurate Tier I support to end users including purchase and installation of applications, hardware purchasing and imaging, accurate record keeping, and corporate mobility device account management.