Previous Job
Previous
IT Security Analyst 3 - SOC Security Eng
Ref No.: 18-48279
Location: Dimondale, Michigan
Start Date: 07/11/2018
Status New
Position # 564794
Position IT Security Analyst 3 - SOC Security Eng
Client & Department State of Michigan- DTMB- MCS
Worksite Address Dimondale, MI 48821
Tenure 10+ Months
No. of Openings 2 (INTERVIEW TYPE: In Person only)
No. of submittals 4










IMPORTANT NOTE:
QUESTIONS DESCRIPTION
Question 1 Absences greater than two weeks MUST be approved by CAI management in advance, and contact information must be provided to CAI so that the resource can be reached during his or her absence. The Client has the right to dismiss the resource if he or she does not return to work by the agreed upon date. Do you accept this requirement?
Question 2 Please list candidate's email address that will be used when submitting E-RTR.
Question 3 The client plans to schedule IN PERSON ONLY interviews for this position July 18th and 19th. Please confirm your candidate will be available to interview any of those days if selected.
Question 4 Please include a paragraph re: candidate's availability, location, applicable skills, and other pertinent information in the Summary of Qualifications tab, when submitting.

SKILL MATRIX:
Skill Required / Desired Amount of Experience Candidate Experience Last Used
Cyber Security Related Certification (CISSP, OSCP, CEH, SANS, etc.) Highly desired
Platform Related Certification (MCSE, RHCE, etc.) Highly desired
BS degree in Computer Science or related field Highly desired
Proven work experience as a system security engineer or information security engineer or *nix/Windows server engineer Required 4 Years
Experience in building and maintaining systems Required 4 Years
Experience working in highly complex Information Technology environments (large company or government) Required 4 Years
Experience in a system administration role supporting multiple platforms and applications Required 4 Years
Experience with network security and networking technologies and with system, security, and network monitoring tools Required 4 Years
Hands on experience in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management Required 4 Years
Experience designing secure networks, systems and application architectures Required 4 Years
Experience scripting in PowerShell, Bash, or Python Highly desired 4 Years
Experience planning, researching and developing security policies, standards and procedures Highly desired 4 Years
Thorough understanding of the latest security principles, techniques, and protocols Required 4 Years
Detailed technical knowledge of database and operating system security Required 4 Years
Familiarity with web related technologies (Web applications, Web Services, Service Oriented Architectures) and of network/web related protocols Highly desired 4 Years
Knowledge of risk assessment tools, technologies and methods Nice to have 4 Years
Knowledge of disaster recovery, computer forensic tools, technologies and methods Ability Desired 4 Years
Ability to communicate network security issues to peers and management Required 4 Years
Ability to read and use the results of mobile code, malicious code, and anti-virus software Desired 4 Years
Problem solving skills Required 4 Years
Experience in Security Operations and System Engineering Required 4 Years
Practical experience with Vulnerability Management tools (eg. Qualys, Tenable) Desired 4 Years
Practical experience with SIEM tools (eg. IBM QRadar, Splunk) Desired 4 Years

SHORT DESCRIPTION: Monitor and advise on information security issues related to the systems and workflow at an agency to ensure the internal IT security controls for an agency are appropriate and operating as intended.

COMPLETE DESCRIPTION: Years of Experience: 8 or more years of experience in the field.

Job Description:
  • Member of the Michigan Security Operations Center (MiSOC) and will focus on Engineering supporting the following functional areas:
    • Vulnerability Management
    • Incident Response
    • Forensics
    • Security Operations
    • Threat Analytics
  • Configure, troubleshoot, upgrade and support security infrastructure devices
  • Support various security platforms, including but not limited to: Vulnerability Management platform (Tenable); Security Incident Event Management (SIEM) platform (IBM's QRadar); Content Filtering (WebSense); and various Symantec security platforms.
  • Identify and define system security requirements
  • Design computer security architecture and develop detailed cyber security designs
  • Prepare and document standard operating procedures and protocols
  • Engineer, implement and monitor security measures for the protection of computer systems, networks and information
  • Develop technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks
  • Ensure that the company knows as much as possible, as quickly as possible about security incidents
  • Write comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement