Pinal County

Florence, Arizona, United States

Cyber Security Engineer

Posted over 1 month ago

Job Description

Overall Job Objective

Description

JOB SUMMARY
Help to safeguard organization's computer networks and systems. Plan and carry out security measures to monitor and protect sensitive data and systems from infiltration and cyber-attacks. Assists Chief Information Security Officer (CISO) with establishing and maintaining the cyber security program to ensure information assets and technologies are adequately protected. Assists in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and information technology (IT) risks.

Example of Duties

TYPICAL CLASSIFICATION ESSENTIAL DUTIES:

  • Assists in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and information technology (IT) risks.
  • Assists in the development, implementation, and maintenance of the County's information security and privacy policies, standards, guidelines, baselines, processes and procedures in compliance with state and federal regulations and standards.
  • Key member in the County's incident response and investigation procedures and processes.
  • Implement cyber protections. Install and use software, such as firewalls and data encryption programs, to protect organizations' sensitive information. Assist computer users with installation or processing of new security products and procedures.
  • Test for vulnerabilities. Install and use software, such as firewalls and data encryption programs, to protect organizations' sensitive information. Assist computer users with installation or processing of new security products and procedures.
  • Assist with providing guidance and advocacy of security issues regarding prioritization of infrastructure investments that impact information security.
  • Monitor for security breaches. Constantly monitor their organization's networks and systems for security breaches or intrusions. Install software that helps to notify them of intrusions, and watch out for irregular system behavior.
  • Understanding potential threats, vulnerability and control techniques.
  • Investigate security breaches. Leads incident response activities to minimize the impact. Afterwards, lead a technical and forensic investigation into how the breach happened and the extent of the damage. Prepare reports of their findings to be reported to management.
  • Assist in developing and administering a County-wide information security training and awareness program.
Minimum Requirements

MINIMUM REQUIREMENTS TO PERFORM WORK:

  • Associates degree in Cyber Security, Computer Science, Information Technology, or related field.
  • One (1) years of professional experience in computing and Cyber information security for a large enterprise.
  • Three (3) years in Information Technology.
  • Or an equivalent combination of relevant education and/or experience may substitute for the minimum requirements.
Preferred Qualifications:
Training and/or Certifications in:
  • Certified Network Defender (CND)
  • EC-Council Certified Security Analyst (ECSA)
  • Certified Network Defense Architect (CNDA)
  • Certified Ethical Hacker (CEH)
  • Certified Ethical Hacker-Forensics Investigator (CEH-FI)
  • Information Systems Security Professional (CISSP)
  • Comptia Security +
  • Or other related cyber security training/accreditation/certification is highly desirable.
Supplemental Information

Knowledge, Skills and Abilities:

  • Knowledge of anti-virus software, intrusion detection, firewalls and content filtering
  • Knowledge of risk assessment tools, technologies and methods
  • Knowledge of penetration techniques and skills
  • Knowledge of disaster recovery, computer forensic tools, technologies and methods
  • Knowledge of system administration roles supporting multiple platforms and applications
  • Skilled in planning, researching and developing security policies, standards and procedures
  • Ability to communicate network security issues to peers and management
  • Ability to read and use the results of mobile code, malicious code, and anti-virus software
  • Ability to design secure networks, systems and application architectures
PHYSICAL DEMANDS:
The work is sedentary and requires exerting up to 10 pounds of force occasionally and/or negligible amount of force frequently or constantly to lift, carry, push, pull or otherwise move objects, including the human body. The work also requires the ability to finger, perform repetitive motion, hear, speak, and demonstrate mental and visual acuity.
WORK ENVIRONMENT:
Work is performed in a dynamic environment that requires the ability to be sensitive to change and responsive to changing goals, priorities, and needs.

79676835

Sorry, this job has expired.