CONSULTANT, CYBERSECURITY & OPERATIONS – UNITED STATES
Posted: 01/25/2022
list
Job Description
ACCOUNTABILITIES
- Participates in analyses of the tools, technology, and procedures required to protect the enterprise in all ways.
- Tools, procedures, data, monitoring, and technology are preserved and streamlined, and performance criteria are established for their successful use.
- Deploys applications, policies, documents, and technology, and sets performance requirements for their good use.
- Works on cybersecurity issues that can be extremely nuanced and broad, with a specific focus on defense operations.
- Selects tools and approaches to define and advocate appropriate alternatives for defense.
- Specializes in one or more fields of security operations, including network, host, database, device, event management, cloud, authentication, identity, and other new technologies.
note
Requirements
Skills
- Capability to develop more complex security operations standards and procedures applicable to complex, technical environments
- Excellent knowledge of system development methodology, project management, system architecture, and analytical/troubleshooting skills
- Strong knowledge of Identity & Access Management solutions, Active Directory, and databases
- Advanced understanding of IT and Cybersecurity technologies
- Strong interpersonal skills
- Professional verbal and communication skills
- Highly motivated, self-starting individual, and able to multi-task and manage to timelines with little supervision
- Collaborative work style
- Excellent written, spoken, and presentation skills
Essential Requirements
- Excellent knowledge and understanding of Federal compliance requirements, including DFARS 252.204-7012, ITAR, NIST 800-171, and CMMC Level 3
- Excellent knowledge and understanding of information security practices and policies, including information security frameworks, standards, and best practices
- Practical understanding of risk management standards including identifying risks and solutions/remediations to reduce them
- Capability to lead complex cybersecurity initiatives
Desired Requirements
- Have Bachelor’s degree in Computer Science, Management of Information Systems, Cybersecurity, Information Assurance, or a related major, or relevant experience
- Having at least 12 years of information security experience; at least 4 years in Identity and Access Management or similar roles
- Industry-standard cybersecurity certification from ISC(2), SANS, or similar entity
work
Responsibilities
- Work with a great deal of independence, and proactively identify complex problems and implement solutions to those problems
- Provide technical expertise to the Identity & Access Management processes for Customer, including directory services, privileged access management, endpoint privilege management, and multifactor authentication solutions
- Support the planning and scoping of Cybersecurity Engineering, Operations, and Identity & Access Management engagements
- Become a part of a highly motivated team that is driven to innovate and deliver capabilities in an agile manner.
- Assist with user life cycle processes including, but not limited to, on-boarding and off-boarding of all types of user accounts
- Assist with IAM Password Management processes and processing of system access requests
alarm_on Work arrangement
Hours: Standard
Location: Round Rock, TX or Hopkinton, MA or Remote
Est Duration: 6 months +
Position:
Cybersecurity Engineering
Location:
Round Rock, TX
Division:
MagRabbit USA