Security Professional Job Description
Security Professional Duties & Responsibilities
To write an effective security professional job description, begin by listing detailed duties, responsibilities and expectations. We have included security professional job description templates that you can modify and use.
Sample responsibilities for this position include:
Security Professional Qualifications
Qualifications for a job description may include education, certification, and experience.
Licensing or Certifications for Security Professional
List any licenses or certifications required by the position: EMT, CISSP, CPR, AED, SSL, ITIL, IP, ISO, SANS, CISM
Education for Security Professional
Typically a job would require a certain level of education.
Employers hiring for the security professional job most commonly would prefer for their future employee to have a relevant degree such as Bachelor's and Master's Degree in Computer Science, Education, Information Systems, Technical, Information Security, Computer Engineering, Information Technology, Information Systems Security, Management, Computer
Skills for Security Professional
Desired skills for security professional include:
Desired experience for security professional includes:
Security Professional Examples
Security Professional Job Description
- Provide liaison between the TSOC and GCC Offices of Primary Responsibility (OPR) to ensure currency with policies, procedures, legislation and regulations and track and monitor resource timelines
- Maintain a database and archive of security cooperation budget authorities, policies, regulations, products, SOCPAC and OSD decisions
- Up to two weeks of travel per month may be required
- Day to day oversight of TIO issues (audit, self-identified, ) to assure that all required remediation activities and tasks are completed in a timely manner and by the target remediation date
- Drive coordination and participation in the Weekly TIO Issues review meeting, escalation meetings, if required Development, publication and maintenance of TIO audit related metrics
- Scoping assigned deals to be relevant on the market but also to drive expected margin
- Fully Accountable for Delivery driving an excellent balance of Project Margin and Customer Satisfaction
- Trusted Advisor to drive upsells within their customer portfolio
- Support Global TVM Practice including thought Leadership, Go-to-Market, Methodology and QA
- Preserve order and enforce rules, regulations and directives for the viability of the site and the safety of personnel
- Experience as a former O-4 or GS 13 having served as a Security Cooperation Officer (SCO)
- Experience with submitting and successfully implementing at least 5 foreign military sales or Building Partner Capacity (BPC) cases while serving as an SCO or while serving on a GCC or sub-unified command staff
- Technical and administrative knowledge of ACF2 security software is a must, knowledge of RACF security software is a plus
- Experience with z/OS operating systems, JCL & Clists
- Experience with preparing for and participating in mainframe security audits
- Experience maintaining mainframe security compliance with policies
Security Professional Job Description
- Develop and perform information security and vulnerability assessments, testing on applications, systems, and infrastructure to ensure appropriate protection of sensitive customer and company information
- Manage relationships with 3rd party Security Operations Centers
- Support day-to-day administration of anti-virusAV products, firewalls and intrusion prevention systems
- Enforce security policies and procedures by administering and monitoring security tools
- Assist in the development and implementation of company-wide information security policies, procedures, standards, and baselines in support of critical business processes to insure the company has protection
- Promote security awareness
- Develop and implement security procedures and threat mitigation strategies for on-premises systems cloud investments (Amazon AWS, MS AZURE)
- Evaluate current security posture, anticipate future requirements and implement changes to safe guard company assets
- Review security programs
- Stay abreast of trends and advances in cybersecurity solutions and monitor changes in legislations that may affect information security
- Ability to troubleshoot technical security problems
- Ability to utilize SSH and CLI utilities DSS key authentication
- Understanding of managed system types specific to implementation ( network device, OS, Database)
- Demonstrated outstanding organizational skills required
- Excellent computer skills including Microsoft Office products, internet and websites required
- This is a highly visible and trusted position for which ONLY qualified candidates will be considered
Security Professional Job Description
- Review of Requests for Proposal and other contractual documentation
- Partnering with USG and internal management for early detection and resolution of actual/potential risk situations
- Conducting security screening and initiating USG clearance processing where applicable
- Developing and presenting Security and Counterintelligence Awareness programs to appropriate personnel
- Assist staff
- Act as the support designer/engineer for networking systems and their subsystems utilizing an understanding of available technology, tools, existing designs and regulatory requirements (e.g., NEI 08-09 R6) security controls, policies and procedures
- Collect, consolidate and analyze business and technical requirements from key constituents
- Support the delivery of the network solutions, including requirements analysis, internal proposal preparation, RFP development, vendor statement of work evaluation, tool selection, and implementation planning
- Assist with the development of network architectures, perform network traffic analysis, predict network bandwidth and storage capacity needs, and recommend modifications to the network configurations which reduces cost, maintain regulatory compliance and improve service
- Assist with developing and maintaining rolling life cycle plans for network infrastructure
- Working knowledge of best practices in relevant areas of IAM Domain (Identity Services, access control, LDAP, audit, Role and Attribute Based Access Control )
- Highly self-motivated and able to work with out supervision
- Bachelor’s degree in Computer Science or related field and a minimum of five years’ experience in IT security
- Ability to work with software and security architectures
- Ability to implement security practices for intranet and Extranet
- CISSP (Certified Information Systems Security Professional) is a plus but not required
Security Professional Job Description
- Enabling business strategy through close collaboration, partnership and early engagement with lines of business, Technology Services and third-party providers to ensure security is a quality deliverable built and not bolted onafter the fact
- Aligning with business lines to better understand their goals, security concerns, road map, required capabilities and common risk themes
- Assessing risks with a risk-based approach, focusing on the most critical assets, systems and business processes
- Conducting end-to-end risk assessments to ascertain a clear view of a business line’s overall security posture, including risks that threaten the business
- Prioritizing security risks that threaten strategic business and technology initiatives, while proactively working to identify mitigate the underlying risks to increase predictability and reduce uncertainty to business operations
- Facilitating the end-to-end convergence of Cybersecurity in all aspects of technology, business processes, and operations to provide robust security capabilities and eliminate security gaps
- Driving security requirements, understanding the Agile framework and how the security support functions best operate to meet the overall security needs of each Agile team and the products they support
- Building and developing the capabilities and competencies of the larger team to drive engagement, efficiency and effectiveness
- Proposing changes to the Information Security Controls as appropriate
- Assisting and contributing to additional projects and deliverables related to regulatory and audit requests as they pertain to Corporate Information Security as requested
- Preferred but not required - Security+, CEH (Certified Ethical Hacker), CISA (Certified Information Systems Auditor)
- Current/Active Secret Security Clearance with a background investigation within the past six (6) years
- 3-5 years of hands on experience with security monitoring tools such as IDP/IDS, FW and AV (Cisco IDS, Snort, Bro, Palo Alto, Checkpoint, Cisco ASA, McAfee, Symantec)
- Ability to perform security analysis, development and implementation of security policies, standards and guidelines
- Ability to quickly explore, examine and understand complex security problems and how it affects a customer’s business
- Experience with both the Linux operating systems
Security Professional Job Description
- Delivers technical and security systems operations training programs to relevant personnel
- Acts as a resource and answers questions for security personnel and general staff on security issues
- Helps devise strategies to communicate security and safety information to general staff, security personnel, and managers
- Works with non-security managers on the presentation of security information in company manuals, departmental training materials, and other staff communications that reference safety and security information
- Monitors electronic systems such as fire detection, electronic access control, closed circuit television, alarm systems, HVAC, and other automated building systems to deter and protect against fire, theft, vandalism, terrorism, and all illegal and unauthorized activity
- Protects the organization’s personnel and physical assets through the detection of attempts at unauthorized access via surveillance systems and other monitoring devices
- Initiates and coordinates engineering, security, fire, or police department response upon detection of unauthorized, suspicious, or problem activity as dictated by security procedures and under the authority or direction of the Corporate Physical Security and Safety Supervisor
- Maintains appropriate logs or records of activities and observations during assigned shift
- Receives, evaluates, and logs calls to the security department’s emergency lines from employees, contractors, the public, law enforcement, and off-site facilities
- As directed, may be called upon to prepare case reports and may be called upon to testify in court
- Current/Active Top Security Clearance or a current Single-Scope Background Investigation (SSBI)
- Experience working with federal regulations related to information security (ITAR, Computer security Act, ) and their foreign equivalents
- Experience with scripting languages (Perl, Python, Bash), databases and analytical tools is a plus
- Ability to listen and collaborate with audiences ranging from IT administrators to executive level stakeholders to help deliver solutions
- Self-motivated and self-educating, yet willing and able to work collaboratively with both customers and fellow Splunkers
- Travel is required up to 80%, possibly more at peak times