Reporting to the Manager, IT Security, the Security Specialist is an integral member of the IT & OT security program. Areas of concentration include secure access service edge, intrusion prevention, network access control, wireless security, firewall auditing, and review of vulnerability information. They assist in the development and implementation of security policies and procedures (e.g., security auditing procedures and use of firewalls and encryption routines). They prepare status reports on security matters to develop security risk analysis scenarios and response procedures. The Security Specialist enforces security policies and procedures by administering and monitoring security profiles, reviewing security violation reports, investigating possible security exceptions, updates, and maintaining and documenting security controls. They utilize their knowledge to educate users on network security standards and procedures.
Qualifications
Education Required: A university degree or college diploma in Computer Science, Business, Engineering, or related discipline
2-5 years related work experience in enterprise networking environment
CYSA+, CISSP certification or equivalent experience in a Security Operations work environment
Controlled Goods and Reliability Security Clearance
ITIL Foundations
Experienced in network security hardware configuration design and administration, Azure networking & firewalling, Secure Access Service Edge design and administration, Operational Technology security fundamentals, Information Security fundamentals, and Security fundamentals
Proficient technical troubleshooting skills
Responsibilities
Investigate and resolve problems of medium complexity
Act as a subject matter expert for network security and other technology areas
Provide work direction, technical support, and risk assessment for secure web gateway, private access, firewalling, & operational technology components deployed
Liaise with subject matter experts, operations teams, implementation support, and production support staff to refine technical specifications, system scope, and objectives
Review and assess proposed and deployed configurations, escalate findings, and manage closure of findings to conclusion
Engage in Red Team/Blue Team exercises & Threat Hunting