Educational Requirements:
• Master's Degree in Information Technology or related specialized field, or an equivalent combination of education, training, and experience.
• PhD Degree preferred-NOT MUST
• Specialized certification may be required.
Experience:
• Typically possesses fifteen or more years of experience in the field performing complex and conceptual analysis, consulting, project management, and providing recommendations.
Required Skills and Attributes:
• Cyber security background
• Certifications: Cybersecurity-related certifications demonstrating senior-level experience (large scale)
• Engineering background is a must
• Customer service mindset with a forward-facing role working with customers
• Documentation and communication are key
• Flexibility with policy work, engineering, etc.
Key Responsibilities:
• Cyber Security Analysis
• Data security background
• Running reports
• Deployment activities within data security
• Working on tickets, incoming requests, and processing requests
• Act independently to uncover and resolve issues associated with the development and implementation of operational projects.
• Develop and recommend long-range goals and objectives.
• Design, research, and develop highly advanced new technological applications resulting in new projects which require major decision-making recommendations.
• Perform technical planning, system integration, verification and validation, cost and risk, and supportability and effectiveness analyses for total systems.
• Ensure the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints.
• Perform functional analysis, timeline analysis, detail trade studies, requirements allocation, and interface definition studies to translate customer requirements into hardware and software specifications.
• Evaluate hardware/software deliveries for installation into operational baseline.
Specific Job Description:
• Candidate must be capable of evaluating hardware/software deliveries for installation into operational baseline.
Day-to-Day Responsibilities/Workload:
• Serve as agile team members focused on data security tasks.
• Monitor and analyze data to prevent unauthorized access, use, or transmission of sensitive information.
• Assist in configuring and managing tools and policies.
• Review alerts for potential data breaches.
• Investigate incidents to determine their cause and impact.
• Collaborate with other IT and security teams to implement corrective actions and improve data protection strategies.