Overview
Skills
Job Details
Title : Network Security Engineer 3
Location : Austin , TX (Once in a week onsite)
Job description
Minimum Requirements: Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will not be considered for this opportunity. | |||
Years ( leave no blanks) | Years | Skills/Experience | Vendor Comments (as applicable) |
| 8+ | Graduation from an accredited four-year college or university with major coursework in cybersecurity, information technology security, computer engineering, computer information systems, computer science, management information systems or a related field. Full-time qualifying work experience may be substituted for each year of the required education (one year = 30 semester hours). |
|
| 8+ | Experience in cybersecurity analysis, or information security analysis. |
|
| 8+ | Experience in security and/or enterprise architecture development, implementation, and management. |
|
| 8+ | Experience in conducting security risk assessments and/or audits of policies, standards, procedures, and technical environments within state and federal statues, regulations, and standards relating to information security and computer crime. |
|
| 8+ | Excellent communication and presentation skills with the ability to articulate technical issues to all levels. |
|
| 8+ | Strong consultative, analytical, and problem-solving skills. |
|
| 8+ | Skills in translating operational requirements into protection needs (i.e., security controls) and to apply cyber security and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation.) |
|
| 8+ | Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. |
|
| 8+ | Skills in applying network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth); to identify critical infrastructure systems with information communication technology that were designed without system security considerations. |
|
Years (as applicable) | Years | Skills/Experience | Vendor Comment (as applicable) |
| 8+ | Being self-motivated, proactive, work independently, and effectively manage your time. |
|