Careers

IT Security Specialist

Job ID# 10144 – Posted 11/16/22 – Remote, Downey, CA

Position Description

An IT Security Specialist interprets information security policies, standards and other requirements as they relate to internal information system and coordinates the implementation of these and other information security requirements. The IT Security Specialist redesigns and reengineers internal information handling processes so that information is appropriately protected from a wide variety of problems including unauthorized disclosure, unauthorized use, inappropriate modification, premature deletion, and unavailability. The IT Security Specialist will provide highly specialized experience in one or more information, computer, or network security disciplines (e.g. penetration testing, accreditation, or risk assessment and mitigation); develop system security plans, certification and accreditation reviews; analyze and establish processes for comprehensive systems and data protection; assess and mitigate system security threats and risks; perform security audits, evaluation, risk assessments and make a strategic recommendations; and manages, supports, installs and maintains security tools and systems, and tracks security patches and incidents.

Skills Required

The IT Security Specialist will possess knowledge and experience in standard methodologies used in certification and accreditation processes; extensive experience following NIST guidelines in risk assessment and management; conducting vulnerability analysis; developing mitigation plans; and performing penetration testing, password protection testing and application security testing.

Skills Preferred

– Advanced skills in timely communications and updates are provided for incident management and root-cause scenarios.
– Ability to work directly with data asset owners and business response plan owners during high-severity events of interest.;
– Leads the effort on messaging and communication related to incident reporting for all audiences.
– Working with teams to provide recommendations to resolve and/or reduce the impact of incidents and to prevent future similar incidents.
– Develop and enrich restoration procedures to mitigate future outages and business disruptions.
– Experience providing written final incident reports to executive management that provide;
– Assessing the scope of incident damage and assisting in the determination of incident severity.;
– Document activities such as investigation, discovery, and recovery during the incident.
– Experience with collaborating with departmental IT teams to identify the root cause of recurring incidents and create action plans to remediate and prevent recurring situations.

Experience Required

Minimum of five (5) years of experience applying security policies, standards, testing, modification and implementation.
At least three (3) years of that experience must be in information security analysis.

Experience Preferred

1. Documenting incident response processes and procedures.
2. Experience with first responder forensics analysis and investigation
3. Experience with triaging and resolving advanced vector attacks such as botnets and advanced persistent threats (APTs)
4. Experience as the leas during business-impacting situations, and work to restore normal service operations in cooperation with cross-functional partners.
5. Experience driving containment strategy during data loss or breach events.
6. Experience with the documentation and maintaining chain of custody of incident evidence.
7. Experience driving post-containment recovery efforts through to complete incident closure
8. Experience providing written final incident reports to executive management that provide;
Assessing the scope of incident damage and assisting in the determination of incident severity.;
Document activities such as investigation, discovery, and recovery during the incident.
9. Experience with collaborating with departmental IT teams to identify the root cause of recurring incidents and create action plans to remediate and prevent recurring situations.

Education Required

This classification requires the possession of a bachelor’s degree in an IT-related or Engineering field. 

Education Preferred

– Qualified Security Assessor (QSA),
– Certified Information Systems Auditor (CISA),
– Certified Information Systems Security Professionals (CISSP),
– Certified Information Security Manager (CISM),
– Certified Information Privacy Professional (CIPP),
– GIAC Certified Incident Handler,
– (GCIH) or GIAC Network Forensic Analyst.

Additional Information

24/7365 Operation – On call

Apply Now

Please send your resume and any additional information to our recruitment team at recruitment@nexlogica.com