Senior Cyber Security Engineer
Location: Remote
Duration: 6 months
Description:
Purpose:
Develops and implements security solutions.
Administers security technology systems by architecting and engineering/developing trusted systems into secure systems.
Assists in the development of implementation and deployment plans that are aligned to the organizational strategic plan objectives and security requirements.
Advises management in developing cybersecurity policies, processes, and procedures.
Perform activities from Installing and Setting up CyberArk to customizing/configuring it for Governance Policies and procedures identified during implementation of the Privilege Identity Management (PIM) system and its production support. Includes onboarding of privileged User IDs into CyberArk from Active Directory, UNIX, Linux, Windows, and zOS/RACF systems.
Assist in and perform the day-day activities related to CyberArk including the development, testing and roll-out phase activities of the implementation and support.
Must be someone who has performed CyberArk PIM implementations before and knows the best solutions for the issues faced normally throughout such projects.
Manage and administer the safes, policies, and custom components of CyberArk application.
Knowledge in implementing and supporting Application Identity Management (AIM).
Develop and manage delivered integrations with CyberArk and other applications like TOAD, SQL Server Management Studio and VMware Horizon Client. Provide guidance during the enhancements of the PIM solution.
Code/Customize the CyberArk product when needed and provide guidance and understanding of the consequences.
Provide documentation of all steps followed and all the activities within those steps during the Implementation to FEPOC. Should be someone who has performed multiple PIM Implementations at large organizations using CyberArk.
Essential Functions:
20% Assists with day-to-day support of security solutions.
20% Assists with engineering support and system administration of specialized cybersecurity solutions.
15% Solves complex problems and answers routine questions about the installation, operation, configuration, and customization of cybersecurity software.
15% Identifies potential conflicts with the implementation of any cybersecurity solutions.
10% Answers routine questions about the installation, operation, configuration, and customization of cybersecurity solutions.
10% Reviews and analyzes appropriate cybersecurity solution system logs for performance and functional anomalies.
10% Works with system design architects and project managers to provide security requirements.
Qualifications
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable
accommodations may be made to enable individuals with disabilities to perform the essential functions.
Education Level: Bachelor's Degree
Education Details: Computer Science, Information Technology, or related field
Experience: 5 years relevant IT security experience
In Lieu Of Education
In lieu of a Bachelor's degree, an additional 4 years of relevant work experience is required in addition to the required work experience.
Preferred Qualifications
Knowledge, Skills and Abilities (KSAs)
Ability to perform risk assessments and investigate cyber security incidents. , Advanced
Ability to understand vulnerabilities at a technical level., Advanced
Knowledge of hardware and software, networks, data centers, systems, and cyber security related issues.
Advanced
Proficient in ethical hacking techniques., Proficient
Strong critical thinking ability and investigative/problem solving skills., Advanced
The incumbent is required to immediately disclose any debarment, exclusion, or other event that makes them ineligible to perform work directly or indirectly on Federal health care programs.
Must be able to effectively work in a fast-paced environment with frequently changing priorities, deadlines, and workloads that can be variable for long periods of time.
Must be able to meet established deadlines and handle multiple customer service demands from internal and external customers, within set expectations for service excellence.
Must be able to effectively communicate and provide positive customer service to every internal and external customer, including customers who may be demanding or otherwise challenging.
Licenses/Certifications
CISSP Certified Information Systems Security Professional Upon Hire Req or
CISM - Certified Information Security Manager Upon Hire Req or
Certified Ethical Hacker (CEH) Upon Hire Req or
Certified Information Systems Auditor (CISA) Upon Hire Req
#J-18808-Ljbffr