Assist in providing IT security services to the company and its customers.
Assist management and its customers in defining their IT Security requirements to meet their business needs.
Assess, provide, and support IT Security systems and products and related services.
The scope of IT Security systems and services may include hardware, software, and operational processes, standards and procedures related to any or all of computers, peripheral equipment, networks, data communications, and office equipment.
You Will:
Analyze alternative solutions by identifying and estimating life-cycle costs and by assisting customers to identify and quantify benefits. Create pilot or prototype solutions. Prepare recommendations and business-case documentation to support the preferred alternatives.
Provide specialized expertise in the use of security software, including utilities such as CipherTrust IronMail, McAfee Enterprise, QualysGuard, ISS RealSecure, Snort, and SourceFire IDS.
Maintain standards, procedures, methodologies, and tools for information-technology staff. Assure the security of systems and databases developed within the division.
Prepare and maintain test data. Perform evaluation tests. Analyze and report test results and observations.
Carry out development and implementation activities for simple to medium-complex IT security systems. Construct system models at the conceptual level, defining components, processes, and relationships with other systems. Review models with customers and other information-technology departments.
Maintain IT security systems. Implement and document enhancements and changes to meet new needs. Analyze trouble reports and implement corrective actions. Resolve emergency problems under time constraints.
Administer IT security products, systems, or databases in production. Monitor the effectiveness and efficiency of use of products, systems, or databases in production. Effect, guide, or recommend corrective actions. Perform archiving procedures and recovery procedures.
You Must Have:
Requires knowledge of the principles of computing systems analysis and design, data management, work simplification, communications, and computer programming.
Requires knowledge of computer science to gain an appreciation of design concepts related to computing equipment and software, in order to provide security solutions to varying customer requirements.
Requires experience to be able to define users' IT security requirements and to design, develop, acquire, and implement the required systems, and information technology products and related services.
Requires experience to understand new and existing information processing concepts, computer and communications equipment, and software.
Requires experience to understand the clients' organizations and the operational characteristics and functions of different systems and databases.
Requires the application of knowledge, judgment, and past practice or precedent in making decisions to resolve problems.