Download Principal Security Engineer– PAE4IT A. PRIMARY ROLE Working

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Cyberwarfare wikipedia , lookup

Wireless security wikipedia , lookup

Next-Generation Secure Computing Base wikipedia , lookup

Post-quantum cryptography wikipedia , lookup

Airport security wikipedia , lookup

Information security wikipedia , lookup

Cyberattack wikipedia , lookup

Mobile security wikipedia , lookup

Security printing wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Social engineering (security) wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Security-focused operating system wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Computer security wikipedia , lookup

Transcript
Principal Security Engineer– PAE4IT
A. PRIMARY ROLE
Working independently, performs highest level analysis of complicated and disparate technical and data architectures by
applying highly specialized training and experiences to identify and rectify technical and information security
vulnerabilities. Provides technical leadership on matters of security, systems administration, and emerging threats.
Makes educated independent judgments as to risk versus benefit and cost of protections. Participates in university
technology projects, and provides reports and recommendations on appropriate tactical and strategic security actions.
Has expertise and provides input that could have a direct impact on important technology decisions made at the highest
levels of the university. Participates in and leads computer emergency response teams. Has limited unilateral authority
to remove high-risk technology components from service. Provides very high level of security technical and practical
expertise/consulting, and must gain and maintain a significant depth of knowledge in many widely varied technology
areas.
B. PRIMARY JOB DUTIES AND RESPONSIBILITIES
% of Time
Duty/responsibility
30 Perform analysis of security threats on supported research and education networks. Develop alert, notification,
and other information product based on that analysis. Collect, disseminate, and analyze information regarding active
network security threats. Respond to requests for security analysis; write reports, papers, or other products as required.
30 Collect, analyze, and distill information regarding current known system vulnerabilities, solutions, and current
intrusion methods and protections, disseminating information as appropriate. Analyze, develop, implement, and
maintain network and system security analysis and other tools. Design, develop, and implement complex security
software; evaluate, recommend, and implement vended security software.
15 Participate in and lead computer emergency response teams. Act as senior point of escalation for response to
cyber security incidents that affect supported backbone networks or that have wide-spread effect. Respond to incidents
of computer security breaches and other incidents involving the use of technology and provide advice to and/or
participate in the collection and analysis of technical evidence (forensics) as required.
15 Provide very high level of security technical and practical expertise/consulting. Make educated independent
judgments as to risk versus benefit and cost of protections. Participate in university technology projects, and
providesreports and recommendations on appropriate tactical and strategic security actions. Have expertise and
provide input that could have a direct impact on important technology decisions made at the highest levels of the
university
5 Develop and maintain contacts at high levels such as organizations of information security officers and IT directors.
Attend conferences and training, and interact as required to maintain knowledge of current issues and best practices.
5 Maintain a significant depth of knowledge in many widely varied technology areas.
C. QUALIFICATIONS
Minimum education: Baccalaureate degree in Computer Science or equivalent experience is required.
Minimum experience:
Six (6) years of advanced systems analysis/, programming, and/or system administration experience is required. Two (2)
years of experience in development, administration, and maintenance of security systems and software are required.
Two (2) years of computer security/abuse incident response and investigation experience is desired.
Required knowledge, skills and abilities:
Extensive working knowledge of the IP protocol suite, specifically relating to TCP and UDP protocol behavior and
interdependencies with the applications suite (DNS, SMTP, HTTP, SSL/SSH, etc.) is required. A demonstrated knowledge
of tcpdump, NetFlow, firewalls, and router ACLs is required. A demonstrated knowledge of intrusion detection and
prevention systems is desired. Extensive working knowledge of operating systems and the utilities used in system
administration, system and kernel customization, security analysis tools, system logging, and security incident diagnosis
is required. A demonstrated ability to program in C, Perl, Python, or other widely-used, general purpose language is
required. Practical experience with one or more relational database packages is required. A demonstrated ability to
apply security tools in small- and large-scale vulnerability assessments (vulnerability scanners, password cracking tools,
etc.) is required. A demonstrated ability to clearly and effectively document the areas of primary responsibility is
required. Position requires demonstration of excellent oral/written communication skills, presentation skills, and
interpersonal skills. Extensive experience in Internet information and application delivery is required. Background
checks are required for all finalists.
Experience in a university-based technology environment is preferred.
Equipment utilized: Modern computing hardware and software, including basic computer networking equipment.
D. LEVEL OF DECISION MAKING
Effort involves interaction and coordination with a wide-range of technical, management, and audit staff, both internal
and external to the university, from entry-level programmers to highly skilled technical staff to functional unit managers
to university executive administrators. Responsible for hiring and managing interns.
E. SCOPE AND IMPACT
Scope of work is university-wide, and is performed on critical university automated processes, computer systems,
networks, information systems, telecommunication systems, and computer procedures and practices.