What are the responsibilities and job description for the IA & SS or Security Engineer position at AHU Technologies Inc?
Role : IA & SS Master (Security Engineer)
Client : DC Government
Location : Washington, D.C.
Job description:
The Security Engineer role will focus on designing and developing security architecture patterns that meet regulatory obligations and data protection requirements as well as align with the business and corporate security strategy. The Security Engineer will work collaboratively with security engineers to build security controls and solutions compliant with approved architecture frameworks and standards.
Duties and Responsibilities
Client : DC Government
Location : Washington, D.C.
Job description:
The Security Engineer role will focus on designing and developing security architecture patterns that meet regulatory obligations and data protection requirements as well as align with the business and corporate security strategy. The Security Engineer will work collaboratively with security engineers to build security controls and solutions compliant with approved architecture frameworks and standards.
Duties and Responsibilities
Strategy and Planning
-Perform security assessments, identify gaps in existing security architecture, and recommend changes or improvements.
-Design security architecture elements to mitigate threats.
-Create solutions that align enterprise security architecture frameworks and standards (e.g. SABSA, NIST 800-53, ISO 27002) with -overall business and security strategy.
-Participate in risk assessments for new technologies and projects.
-Employ secure configuration management processes.
-Assist in developing a disaster recovery and business continuity plan. Identify and prioritize system functions required to promote continuity and availability of critical business processes such that in the circumstance of system failure critical business functions are restored or recovered promptly.
Communication
-Document security requirements and controls for protecting information, systems, and technology assets.
-Define and document how the implementation of a new technology impacts the security posture of the current environment.
-Document and update as necessary all definition and architecture activities.
-Provide input on security requirements to be included in request for proposals (RFPs), statements of work (SOWs), and other procurement documents.
-Communicate current and emerging security threats to project team members.
Education
-Bachelor’s or Master’s degree in Information Technology, Cybersecurity, Computer Science or related field
-CISSP, CISA, CISM, or other relevant security related certifications is required
-CISSP-ISSAP, TOGAF, or SABSA certifications considered an asset.
Qualifications
Experience in identifying gaps in existing architectures.
-Bachelor’s or Master’s degree in Information Technology, Cybersecurity, Computer Science or related field
-CISSP, CISA, CISM, or other relevant security related certifications is required
-CISSP-ISSAP, TOGAF, or SABSA certifications considered an asset.
Qualifications
Experience in identifying gaps in existing architectures.
Experience in designing security architectures to mitigate threats.
Knowledge of computer networking concepts and protocols (e.g. TCP/IP, DNS) and network security methodologies.
Knowledge of network access, identity, and access management (e.g. public key infrastructure, Oauth, OpenID, SAML, SPML).
Knowledge of capabilities and applications of network equipment including routers, switches, servers, transmission media, and related hardware.
Knowledge of remote access technology concepts.
Knowledge of application firewall concepts and functions (e.g. single point of authentication enforcement, data anonymization, DLP scanning, SSL security).
Work experience in cybersecurity designs for systems, networks, and multi-level security requirements or requirements for processing multiple classification levels of data.
Knowledge of risk management processes and experience in conducting risk assessments.
Familiarity with the application of privacy principles to organizational requirements.
Knowledge of identity and access management methods.
Experience with Windows, Unix, and Linux operating systems.
Knowledge of business continuity and disaster recovery operation plans.
Flexible work from home options available.
Salary : $90 - $95