Who is a Cyber Security Specialist ?
Cyber Security Specialist is responsible for providing security during the development stages of software systems, networks and data centers. The professionals have to search for vulnerabilities and risks in hardware and software. They manage and monitor any attacks and intrusions.
The Security Specialist has to recognize the potential threat or attempted breach by closing off the security vulnerability. They build firewalls into network infrastructures.
What does Cyber Security Specialist do?
The Cyber Security Specialist takes care of the day-to-day operations and data structures by overseeing the operational performance. They configure anti-virus systems and consoles. The professionals must have an in-depth understanding of vulnerabilities management systems and common security applications.
The Security Specialist conducts threat and risk analysis and provides essential suggestions. The professional help in performing research, testing, evaluation, and deployment of security procedures. They conduct software upgrades and explain performance criteria, document configurations, and systems specifications. They manage the PPC system from threats and identify and manage incidents and mitigate risks.
Job brief
Any computer connected to the internet is vulnerable to cyber-attacks. Cybersecurity, or IT security, is the technique used to protect computers and networks from criminal intrusion. Our company is looking for a Cyber Security Specialist in the tech sector to fight off an increasingly daring and ruthless cohort of global cybercriminals and hackers and will need to build security during the development stages of software systems, networks, and data centers.
Responsibilities
- Safeguards information system assets by identifying and solving potential and actual security problems.
- Protects system by defining access privileges, control structures, and resources.
- Recognizes problems by identifying abnormalities; reporting violations.
- Implements security improvements by assessing current situation; evaluating trends; anticipating requirements.
- Determines security violations and inefficiencies by conducting periodic audits.
- Upgrades system by implementing and maintaining security controls.
- Keeps users informed by preparing performance reports; communicating system status.
- Maintains quality service by following organization standards.
- Maintains technical knowledge by attending educational workshops; reviewing publications.
- Contributes to team effort by accomplishing related results as needed.
Key requirements
- Bachelor’s degree in Computer Science, Information Systems, or equivalent education or work experience
- 4+ years of prior relevant experience
- Advanced certifications such as SANS GIAC/GCIA/GCIH, CISSP or CASP and/or SIEM-specific training and certification
- Hold DoD-8570 IAT Level 2 baseline certification (Security+ CE or equivalent) at the start date
- Advanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth, and common security elements.
- Hands-on experience analyzing high volumes of logs, network data (e.g. Netflow, FPC), and other attack artifacts in support of incident investigations
- Experience with vulnerability scanning solutions
- Familiarity with the DOD Information Assurance Vulnerability Management program.
- Proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics, and RSA Security