Background and previous experience deploying privileged user management across a distributed enterprise environment
Background and previous experience deploying data discovery and data loss prevention across a distributed enterprise environment
Experience with UNIX, Windows, Linux, MacOS, Cisco, Juniper, web applications, databases, strong authentication, operating systems and network security protocols and procedures
Expert understanding of information, computer and network security
Expert understanding of user access permissions and role based access controls
Expert understanding of access control logging and reporting systems
Responsibilities
Assist Division of Information Security with the implementation and integration of privileged user management, data classification, data loss prevention and security systems
Develop plans for implementation and integration within existing division and agency infrastructure
Develop repeatable guides for standard implementation and assist agencies as needed to incorporate systems
Work with existing staff to architect and deploy Privileged User Management, data classification, Data Loss Prevention and security systems in a highly complex distributed enterprise environment
Create customized solutions to integrate file systems, storage arrays, databases, VPN, file services, etc., into a holistic enterprise solution for access control and data identification/loss prevention
Implement and develop guiding documentation for Division of Information Security and multiple agencies
Develop repeatable installation and configuration documentation to assist deployment teams and agencies that wish to install approved security solution within their agencies
Assist as necessary agencies in the deployment, configuration, operation and sustainment of security systems
Work with Security Operations Center to identify enhanced data collection and correlation capabilities in existing data and gaps in data collection/analysis architecture, systems and procedures
Identify and develop solutions for preventing, detecting and mitigating risks to information and information systems
Conduct training as necessary to division and agency personnel on security processes, procedures and methodologies to ensure security event information is properly identified, correlated, documented and mitigated in accordance with department standards
Job Description
About The Role:
Assist Division of Information Security with the implementation and integration of privileged user management, data classification, data loss prevention and security systems. Develop plans for implementation and integration within existing division and agency infrastructure. Develop repeatable guides for standard implementation and assist agencies as needed to incorporate systems.
Work with existing staff to architect and deploy Privileged User Management (PUM), data classification, Data Loss Prevention (DLP) and security systems in a highly complex distributed enterprise environment. Create customized solutions to integrate file systems, storage arrays, databases, VPN, file services, etc., into a holistic enterprise solution for access control and data identification/loss prevention
Implement and develop guiding documentation for Division of Information Security and multiple agencies.
Develop repeatable installation and configuration documentation to assist deployment teams and agencies that wish to install approved security solution within their agencies.
Assist as necessary agencies in the deployment, configuration, operation and sustainment of security systems.
Work with Security Operations Center to identify enhanced data collection and correlation capabilities in existing data and gaps in data collection/analysis architecture, systems and procedures.
Identify and develop solutions for preventing, detecting and mitigating risks to information and information systems.
Conduct training as necessary to division and agency personnel on security processes, procedures and methodologies to ensure security event information is properly identified, correlated, documented and mitigated in accordance with department standards.
Qualifications
Required skills
Expert level security information architecture
Expert level Identity Access Management (IAM)
Background and previous experience deploying privileged user management (PUM) across a distributed enterprise environment.
Background and previous experience deploying data discovery and data loss prevention (DLP) across a distributed enterprise environment.
Experience with UNIX, Windows, Linux, MacOS, Cisco, Juniper, web apps, databases, strong authentication, operating systems and network security protocols and procedures.
Expert understanding of information, computer and network security.
Expert understanding of user access permissions and role based access controls.
Expert understanding of access control logging and reporting systems.