Full-Time

Information Security Engineer

Idealforce

Idealforce

No salary listed

Phoenix, AZ, USA

In Person

Category
IT & Security (2)
,
Required Skills
LDAP
Cryptography
penetration testing
Linux/Unix
Requirements
  • A Bachelor’s degree in Information Technology or related field, along with approximately five (5) additional years of relevant IT professional experience; OR, approximately 9 years of relevant IT professional experience
  • Approximately 5-7 years of progressive Information Technology in physical, application networking security policies, procedures and practices
  • Comprehensive in depth Unix/Linux knowledge and administration experience
  • Direct experience creating and participating in a comprehensive Risk Assessment program
  • Experience in performing computer system penetration testing and risk mitigation
  • Experience with LAN/WAN network topologies, protocols, file/application servers, encryption technologies and the network operating hardware and software, FTP, Active Directory, VPN technologies (such as MPLS, IPSEC, etc.) IIS and ISA Proxy Server
  • Demonstrated experience in firewalls, IDS/IPS systems, event correlation systems, content filters, SYSLOG and SNMP
Responsibilities
  • The Information Security Engineer is responsible for reviewing and providing oversight for network and mainframe security hardware and software to ensure the protection of DOR’s information assets from unauthorized use, modification, or destruction.
  • The Information Security Engineer will apply their advanced knowledge and technical skills in network security and will exercise latitude for independent judgment and discretion within established policies and procedures.
  • The Information Security Engineer will approach assignments with considerable creativity and innovation.
  • To provide security oversight ensuring confidentiality, integrity, and availability(CIA) for DOR information and on-going security auditing;
  • To evaluate IT infrastructure and applications as they relate to security architecture and design;
  • To make recommendations on the design, selection, and modification of appropriate hardware and software to meet security requirements of network and mainframe systems and information processing needs;
  • To participate in projects relating to security and technical considerations and deployment activities;
  • To support IT disaster recovery documentation, testing and review; and to assist with DOR Information Security policies and standards creation and review.
Desired Qualifications
  • None

Company Size

N/A

Company Stage

N/A

Total Funding

N/A

Headquarters

N/A

Founded

N/A