Information Systems Security Professional Education, Training & Library - Charlotte, NC at Geebo

Information Systems Security Professional

Job Description An Information Security Specialist interprets information security policies, standards and other requirements as they relate to internal information system and coordinates the implementation of these and other information security requirements.
The Information Security Specialist redesigns and reengineers internal information handling processes so that information is appropriately protected from a wide variety of problems including unauthorized disclosure, unauthorized use, inappropriate modification, premature deletion, and unavailability.
The Information Security Specialist will provide highly specialized experience in one or more information, computer, or network security disciplines (e.
g.
penetration testing, accreditation, or risk assessment and mitigation); develop system security plans, certification and accreditation reviews; analyze and establish processes for comprehensive systems and data protection; assess and mitigate system security threats and risks; perform security audits, evaluation, risk assessments and make a strategic recommendations; and manages, supports, installs and maintains security tools and systems, and tracks security patches and incidents.
Skills Required The Information Security Specialist will possess knowledge and experience in standard methodologies used in certification and accreditation processes; extensive experience following NIST guidelines in risk assessment and management; conducting vulnerability analysis; developing mitigation plans; and performing penetration testing, password protection testing and application security testing.
Skills Preferred:
Working knowledge and experience in remote access VPN technologies such as Juniper Secure Access, Zscaler Private Access environment including, but not limited to, the configuration of all resource profiles and policies, user realms and roles, sign-in pages and policies, access policy, and delegated administration privileges.
- Working knowledge and experience in managing Internet Security/URL Filtering solutions such as Bluecoat, Cisco Umbrella, Zscaler Internet Access in a high availability environment that supports 2000 or more users.
Experience Required:
This classification must have a minimum of five (5) years of experience applying security policies, standards, testing, modification and implementation.
At least three (3) years of that experience must be in information security analysis.
Experience Preferred:
Two (2) years of experience within the last three (3) years managing and supporting Zscaler Private Access or Juniper Secure Access (SA or MAG Series) clustered environment and working with end-users to troubleshoot and resolve remote access related issues.
- Two (2) years of experience within the last three (3) years designing, implementing, upgrading, and troubleshooting Internet Security/URL Filtering solution such as Zscaler Internet Access in the enterprise environment that supports 2000 or more users.
- Three (3) years of experience within the last five (5) years as a Systems Administrator or Information Security Specialist supporting a network environment with at least 100 servers, 2,000 or more users and multiple firewalls, switches, and routers.
The network environment must consist of multiple VLANs in a single location and multiple physical locations connected through routers or similar layer-3 routing devices.
Education Required This classification requires the possession of a bachelors degree in an IT-related or Engineering field.
Additional qualifying experience may be substituted for the required education on a year-for-year basis.
Education Preferred:
Preferred security trainings and certifications such as ZCCA-IA, ZCCP-IA, ZCCA-PA, ZCCP-PA, CISSP, CISA, or GIAC certifications.
Recommended Skills Access Controls Administration Application Security Certified Information Security Manager Certified Information Systems Security Professional Cisco Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.