Network admin
Location: Reston, VA
Duration: 6+ Months
Responsibilities
Responsible for developing and administering data security policies as well as safeguarding information, evaluating existing data security procedures and identifying new areas of risk. Staff administers and trains on IT security policies and rules (e.g. log-in / passwords, etc.). Staff are involved in patch management, anti-virus program, vulnerability detection, threat analysis & response, network intrusion & response, security incident response and escalation crisis management. Full use and application of standard principles, theories, concepts, and techniques. Provides resolutions to an assortment of problems. Works under normal supervision. Follows established directions. Work is reviewed for accuracy of technical analysis and overall adequacy. Primarily intra-organizational with occasional inter-organizational and external customer contacts on routine matters. College Degree or equivalent experience; work towards advanced studies/degree preferred. Typically has 2 - 4 years related experience.
Basic Requirements
Maintain a continuous process improvement work environment, recommending and implementing new/improved process in accordance with industry standards and best practices. Participate in efforts to identify, evaluate, test, and implement appropriate security products, tools and systems to establish a secure infrastructure. Articulate security policies, guidelines and standards to customers and developers in order to provide control and consistency throughout Freddie Mac. Perform all procedures necessary to protect the safety of the information systems from internal and external threats.
Participate in efforts in the identification and resolution of critical security issues. Builds, develops, and maintains relationships with internal and external customers, and vendors to formulate solutions to Freddie Mac and customer system issues related to Information Security. Support actions or recommends alternate solutions to resolve problems or situations. Researches and maintains currency regarding information security issues, solutions and potential implications for Freddie Mac. Supports designs efforts of critical projects and implements newly developed or revised systems or initiatives.
Responsibilities include:
-Execution of the security assessment and monitoring processes.
Ensures the effective execution of control related procedures for security events affecting the company's information assets.
-Work with management to ensure the successful execution of Information Technology control processes in the Security Monitoring and Security Configuration Management functions. Participate in the improvement and development of process/procedure manuals and documentation for security monitoring, security configuration standards and threat analysis.
-Collect vulnerability and threat information from vendors, researchers, and other sources; Perform correlation of threat/vulnerability sources to provide recommendation on potential actions and assessment of overall security threat posture; mature the current vulnerability scanning/assessment capabilities.
-Consult/Assist with processes responsible for the analysis of security threat information (malicious code, industry events, hackers and zero day exploits, OEM weaknesses, intrusion logging, etc.) in order to proactively prepare for security events.
Education/Experience
-4-year degree in Information Security, Computer Science, Information Technology, Management Information Systems or equivalent work experience -GSEC, GCIH, CCNA, CISSP or similar security related industry certification -Experience in system administration/security administration of multiple platforms and operating systems such as Solaris/AIX/Linux and Microsoft Windows Server 2000/2003 -Demonstrated knowledge of network security, protocols, architecture and packet analysis -Strong knowledge of malware and anti-malware tools -Experience with the following security technologies is required:
Firewalls, Intrusion Detection Systems (IDS), Vulnerability Scanners, Security Configuration Management tools, Malware Analysis tools, Log Collection systems, SIEMs, Data Loss Prevention and End Point Solutions.
-Strong technical analysis writing and communication skills
Preferred Skills
-Previous Security Operations Center (SOC) experience -Must be able to work independently and in a team environment
Bala
Accounts Manager
SSAI Technologies LLC | Board: 908 450 9465| Fax: 908 842 0244 | www.ssaitech.com | Email: bala@ssaitech.com | bala.ssaitech@gmail.com
WBE/MBE certified for the State of NJ
Note: We respect your online privacy. TBill s.1618 Title III passed by the 105th US Congress this mail cannot be considered Spam as long as we include contact information and a method to be removed. If you are not interested in receiving our e-mails then please reply with a "REMOVE" in the subject line. I am sorry for the inconvenience caused to you
Iphone class room training in NJ - call for details.