IT Cybersecurity Specialist Government - Millington, TN at Geebo

IT Cybersecurity Specialist

DUTIES AND RESPONSIBILITIES In order to qualify for this position, resumes must provide sufficient experience and/or education, knowledge, skills, and ability to perform the duties of the position. Applicant resumes are the key means for evaluating skills, knowledge, and abilities as they relate to this position therefore, applicants are encouraged to be clear and specific when describing experience. Develops policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data. Provides timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities; and distinguishing these incidents and events from benign activities. Receives and analyzes network alerts from various sources within the enterprise and determines possible causes of such alerts. Performs event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack. Analyzes identified malicious activity to determine weaknesses exploited, exploitation methods, and effects on system and information. Documents and escalates incidents that may cause ongoing and immediate impact to the environment. Monitors information security data sources to maintain organizational situational awareness. Works with stakeholders to resolve computer security incidents. Provides summary reports of network events and activity relevant to cyber defense practices. Ensures the rigorous application of information security/information assurance policies, principles, and practices in the delivery of all IT services. Resumes must include information which demonstrates experience and knowledge, skills, and ability (KSAs) as they relate to this position. Applicants are encouraged to be clear and specific when describing their experience level and KSAs. Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data sufficient to provide advice and guidance in implementing IT security policies and procedures in the development and operation of network systems. Knowledge of cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity sufficient to react accordingly by instructing or informing other IT specialists to minimize the extent of the activity and any damage that may be caused. Knowledge of security event correlation processes. Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions. Knowledge of network traffic analysis methods. Knowledge of incident response and handling processes. Knowledge of industry-standard and organizationally accepted analysis principles and methods. Skill in conducting continuous monitoring capabilities designed to detect and respond to security incidents. Skill in analyzing/evaluating data and preparing reports. Ability to communicate effectively both orally and in writing.
  • Department:
    2210 Information Technology Management
  • Salary Range:
    $65,000 to $74,000 per year

Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.