Educational Requirements:
- Master's Degree in Information Technology or related specialized field, or an equivalent combination of education, training, and experience.
- PhD Degree preferred-NOT MUST
- Specialized certification may be required.
Experience:
- Typically possesses fifteen or more years of experience in the field performing complex and conceptual analysis, consulting, project management, and providing recommendations.
Required Skills and Attributes:
- Cyber security background
- Certifications: Cybersecurity-related certifications demonstrating senior-level experience (large scale)
- Engineering background is a must
- Customer service mindset with a forward-facing role working with customers
- Documentation and communication are key
- Flexibility with policy work, engineering, etc.
Key Responsibilities:
Cyber Security Analysis
Data security background
Running reports
Deployment activities within data security
Working on tickets, incoming requests, and processing requests
- Act independently to uncover and resolve issues associated with the development and implementation of operational projects.
- Develop and recommend long-range goals and objectives.
- Design, research, and develop highly advanced new technological applications resulting in new projects which require major decision-making recommendations.
- Perform technical planning, system integration, verification and validation, cost and risk, and supportability and effectiveness analyses for total systems.
- Ensure the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints.
- Perform functional analysis, timeline analysis, detail trade studies, requirements allocation, and interface definition studies to translate customer requirements into hardware and software specifications.
- Evaluate hardware/software deliveries for installation into operational baseline.
Specific Job Description:
- Candidate must be capable of evaluating hardware/software deliveries for installation into operational baseline.
Day-to-Day Responsibilities/Workload:
- Serve as agile team members focused on data security tasks.
- Monitor and analyze data to prevent unauthorized access, use, or transmission of sensitive information.
- Assist in configuring and managing tools and policies.
- Review alerts for potential data breaches.
- Investigate incidents to determine their cause and impact.
- Collaborate with other IT and security teams to implement corrective actions and improve data protection strategies.