Security & Training Specialist SJCOG

  • Stockton, CA
  • Posted 2 days ago | Updated 2 days ago

Overview

On Site
$0.01 - $45
Full Time

Skills

Adult Education
Auditing
Available-to-promise
Backup
CISSP
CTT+
Certified Ethical Hacker
Cloud Computing
Communication
Cyber Security
D3.js
Documentation
Endpoint Protection
Government Contracts
HIPAA
ISO/IEC 27001:2005
IT Service Management
Managed Services
Incident Management
Instructional Design
Insurance
Malware Analysis
Management
Microsoft
Microsoft Office
Microsoft Windows
Network
OS X
OSCP
Recovery
Recruiting
Regulatory Compliance
Onboarding
Penetration Testing
Privacy
Public Sector
Qualys
RPO
Reporting
Roadmaps
SaaS
Security Awareness
Security+
Service Desk
System On A Chip
Technical Writing
Training
Training Delivery
Vendor Relationships
Vulnerability Management
Vulnerability Scanning
Workflow

Job Details

Comtech seeks a Security & Training Specialist to support SJCOG s Managed IT Services program. This role will implement and operate endpoint protection, vulnerability scanning, coordinate penetration testing, lead incident response activities, and design and deliver security awareness training for SJCOG staff. The Specialist will work closely with the IT Service Manager/vCIO, Network & Systems Engineer, and Service Desk Manager to remediate findings, harden systems, and maintain audit-ready documentation aligned to NIST, ISO 27001, and CIS Controls. Duties include running quarterly vulnerability scans, coordinating annual penetration tests, validating and triaging live alerts from monitoring systems, conducting phishing simulations and security training, and participating in catastrophic recovery and incident response exercises. Services must be performed by vendor employees (no subcontractors) and comply with contract insurance and reporting requirements.

Key Responsibilities:

  • Implement, manage, and tune endpoint protection (anti-malware, EDR) across Windows and macOS devices; validate coverage and respond to endpoint detections
  • Plan, execute, and report on vulnerability management: schedule and run scans at least quarterly, triage vulnerabilities, prioritize remediation, and track closure.
  • Coordinate and support annual penetration testing (and any after-major-change tests): act as vendor liaison, ensure scope matches critical assets, and oversee remediation tracking.
  • Lead incident response activities: participate in on-call rotations for security incidents, perform containment/eradication/recovery tasks, maintain incident logs, and conduct post-incident reviews and improvements.
  • Design and deliver security awareness programs: phishing simulations, role-based training, onboarding security briefings, and periodic re trainings; measure training effectiveness and report metrics.
  • Integrate security monitoring and live-alert triage into the SOC/monitoring workflow; validate alerts, escalate high-impact issues, and produce remediation playbooks/runbooks.
  • Assist with M365 security posture and M365 SaaS backup validation; work with administrators to ensure secure configurations and recovery readiness.
  • Maintain audit-ready documentation: policies, procedures, training records, remediation logs, and evidence supporting compliance with NIST CSF, ISO 27001, CIS Controls, and applicable privacy laws (CCPA/HIPAA where relevant).
  • Participate in tabletop and live DR tests tied to the Catastrophic Recovery & Management Plan; help define RTO/RPO for security-sensitive systems.
  • Provide monthly security metrics and narrative in the Managed Services reports; recommend improvements and roadmap items to reduce organizational risk.

Mandatory Qualifications & Experience - Security and Training Specialist

M1.

Experience: 3 5 years of hands-on cybersecurity experience (endpoint protection, vulnerability scanning, and incident response) in an enterprise or public sector environment.

M2.

Endpoint Security: Demonstrated experience deploying and operating EDR/advanced endpoint protection on both Windows and macOS platforms; ability to investigate and remediate endpoint incidents.

M3.

Vulnerability Management: Practical experience running vulnerability scans, interpreting results (CVSS/priority), and coordinating remediation workflows to closure.

M4.

. Penetration Testing Support: Experience coordinating third-party pentests or participating in internal offensive/defensive exercises and implementing remediation recommendations.

M5.

Incident Response: Proven involvement in incident response lifecycle (identification, containment, eradication, recovery, lessons learned), including logging and reporting.

M6.

Training & Awareness: Experience designing, delivering, and measuring security awareness programs and simulated phishing campaigns; strong instructional skills.

M7.

Compliance Familiarity: Working knowledge of NIST CSF, ISO 27001, CIS Controls, and privacy frameworks such as CCPA/HIPAA; capable of maintaining audit-ready documentation.

M8.

On-site Requirement & Staffing Rules: Must be able to be onsite in Stockton, CA within one (1) hour for critical incidents; understand that all services must be performed by vendor employees (no subcontractors).

M9.

Communication: Strong written and verbal skills; able to create clear training materials, reports, and technical documentation for technical and non-technical audiences.

 
  
  
  
  
  

 

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.