1. NATURE OF THE TASKS
• Installation, configuration, maintenance and upgrades of cyber security solutions and components
• Monitor managed components and manage incidents and problems
• Perform day-to-day system management
• Harden system and network components
• Develop, maintain and roll-out reference configurations
• Implement and follow security policies
• Elaborate and maintain system inventory/CMDB, system documentation, operating procedures
• Report on service performances and availability, produce dashboards
• Design, develop, install, configure, test, monitor, maintain, troubleshoot and upgrade cyber security infrastructure
• Provide expertise, guidance, recommendations and documented security configurations for implementation of security tools and processes
• Produce detailed engineering specifications
• Evaluate and recommend secure configurations
• Identify security requirements, based upon need or translate high-level security requirements into detailed technical requirements
• Support various technical and non-technical stakeholders to specify and negotiate security requirements
• Interact with network and system engineering teams to effectively communicate and develop security solutions
• Drafts documentation and standard operational procedures to support security systems operations
• Ensures the technical design and contributes to implementation of new components and/or enhancements in coordination with other team members in particular project managers, security architects and engineers.
• Ensure DRP through appropriate back-ups methods to ensure RTO are met.
• Ensure service continuity for the managed components to defined SLAs.
• Ensure capacity planning
• Support security monitoring use-case engineering
• Security events collection technical design. Integration of log sources into a SIEM solution.
• Elaboration and translation of the security monitoring policy into monitoring rules
• Investigate, diagnose and solve system related problems
• Diagnose and solve problems and faults occurring in the operation of cyber security components
• Comply with organization procedures to ensure integrity of the system
• Recommend resolutions and improvements
• Provide integrated solutions
• Provide consolidate findings on components or processes
• Document cyber deffence components configurations
• Ensure that systems meet agreed service levels
• Ensure that communication performance, recovery, and security needs meet agreed service agreement standards
• Contribute to define network design policies, philosophies and criteria
• Craft, fine-tune and validate low level intrusion detection rules for network and host protection
• Development, test and roll-out new releases of Identity and Access Management solutions
2. KNOWLEDGE AND SKILLS
Specific Requirements (Experience and/or Knowledge):
• Network security engineering
• System security engineering
• Network security administration
• System security administration
• Security testing (functional and non-functional)
• Cryptography
Specific Skills (Experience and/or Knowledge)
• Network Protocols (including IP, TCP, UDP, DNS, SMTP, Syslog-ng, HTTP, IP routing and fail-over protocols, IEEE 802.1x)
• Cryptographic solutions (including common standards and ciphers, symmetric and asymmetric encryption, PKI, HSM, smartcards)
• Security protocols (including SSL/TLS, IPsec, and VPN)
• Ability to design, develop, install, configure, test, monitor, maintain, troubleshoot and upgrade at least one of the products mentioned in Appendix X List of Core products and solutions.
• Ability to write comprehensive documentation.
• Authentication, authorisation and accounting (including RADIUS, TACACS+, Kerberos, ADFS)
• Enterprise Active Directory and GPO development
• Auditing systems and networks for configuration weaknesses and vulnerabilities
• Hardening/Securing of Windows Servers and Desktops
• Hardening/Securing of Unix-like systems (such as System V, Linux, BSD)
• Administration and task automation using scripting and/or programming languages (e.g. Python, PowerShell, Perl, Java)
Desirable certification(s):
• GSEC (GIAC Certified Security Essentials)
• GCWN (GIAC Certified Windows Security Administrator)
• GCED (GIAC Certified Enterprise Defender)
• GCUX (GIAC Certified UNIX Security Administrator)
• ENSA (EC-Council Certified Network Administrator)
• Microsoft Certified System Center Configuration Manager
• GCIH (GIAC Certified Incident Handler)
• MCSA (Microsoft Certified Solutions Associate)
• MCSE (Microsoft Certified Solutions Expert)
• Vendor Specific Product Certifications