Information Systems Security Engineer Job Description Template
Our company is looking for a Information Systems Security Engineer to join our team.
Responsibilities:
- Deployment, implementation and strategy of tools and related Network Security Management Systems;
- Provide strategies and establish processes to assist programs in establishing certification and accreditation necessary to operate network systems;
- Provide regular status reporting of security strategic projects to senior management and customers;
- Responsible for senior level incident investigation and remediation to address customer and executive level actions;
- Interact externally as a consultant to customers;
- Build, monitor, and manage the cloud infrastructure;
- Ensure security is integrated into all cloud services;
- Monitor and optimize cloud workloads and performance;
- Establish implementation standards and methods such as configuration and change management;
- Participate in deep architectural discussions to ensure solutions are designed for successful deployment in the cloud;
- Develop roadmaps for current and future deployments;
- Review current and future AWS implementations with the sectors in ISD and suggest ways to improve and standardize the cloud offerings.
Requirements:
- Top Secret Clearance;
- Detailed technical knowledge of database and operating system security;
- BS in Computer Science, Cyber Security, Computer Engineering, or related discipline;
- Thorough understanding of the latest security principles, techniques, and protocols;
- Experience with Windows-based platforms;
- Current CISSP-ISSEP or CISSP-ISSAP;
- Strong scripting skills and familiarity with monitoring tools;
- Evaluate firewall change requests and assess organizational risk;
- Assist with the implementation of counter-measures or mitigating controls;
- Communicate alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems;
- Experience in building large distributed systems;
- Deep technical background (operating systems, networking, application performance management, load balancing, security systems, etc.);
- Prepare incident reports of analysis methodology and results;
- Demonstrated ability to effectively engage with Sponsor Information System Security Managers (ISSMs) to sensure security compliance of systems;
- Experience in supporting highly available applications on Linux and Windows virtual environments.