Top.Mail.Ru
Senior Cyber Security Systems Administrator Telecom
012 -5961868
negotiable
29.11.2021

Job Description

Responsibilities :


Installs, configures, troubleshoots, and maintains server and systems configurations (hardware and software) in Information Security environment and in supportive secuirty systems to ensure their confidentiality, integrity, and availability. Administers server-based systems, security devices, distributed applications, network storage, messaging, and performs systems monitoring. Consults on network, application, and customer service issues to support computer systems’ security and sustainability;
Installs, configures, tests, operates, maintains, and manages network devices including hardware, software, and operating systems within Information Security environment  that permit information sharing across the full spectrum of transmission using all media. Supports the security of information and information systems;
Conduct analysis of log files, evidence, and other information in order to determine best methods for identifying the perpetrator(s) of a network intrusion;
Conduct large-scale investigations of criminal activities involving complicated computer programs and networks;
Administer Enterprise Network Defense (END) test bed(s), and test and evaluate new cyber defense applications, rules/signatures, access controls, and configurations of platforms managed by service provider(s);
Coordinate with Enterprise Network Defense (END) Analysts to manage and administer the updating of rules and signatures (e.g., intrusion detection/protection systems, anti-virus, and content blacklists) for specialized cyber defense applications;
Implement Risk Management Framework (RMF)/Security Assessment and Authorization (SA&A) requirements for specialized Enterprise Network Defense (END) systems within the enterprise, and document and maintain records for them;
Perform system administration on specialized Enterprise Network Defense (END) applications and systems (e.g., anti-virus, audit and remediation) to include installation, configuration, maintenance, backup and restoration;
Assist in perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security;
Assist in perform command and control functions in response to incidents;
Conducts and documents the systems integration, testing, operations, maintenance, and security of an information security environment and of DevSecOps systems in relevance. Coordinates threat and mitigation strategies across the enterprise;
Develop centralized cryptographic key management capability;
Identify functional- and security-related features to find opportunities for new capability development to exploit or mitigate cyberspace vulnerabilities.

Requirements :


Knowledge of computer networking concepts and protocols, and network security methodologies;

Knowledge of cyber threats and vulnerabilities;

Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems;

Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]);

Knowledge of cryptography and cryptographic key management concepts;

Knowledge of database systems;

Knowledge of electrical engineering as applied to computer architecture, including circuit boards, processors, chips, and associated computer hardware;

Knowledge of how system components are installed, integrated, and optimized;

Knowledge of information security principles and methods (e.g., firewalls, demilitarized zones, encryption);

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]);

Knowledge of network design processes, including security objectives, operational objectives, and trade-offs. 

Knowledge of operating systems;

Knowledge of key concepts in security management (e.g., Release Management, Patch Management);

Knowledge of security system design tools, methods, and techniques;

Knowledge of key telecommunication concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers);

Skill in designing security controls based on information security principles and tenets;

Skill in determining how a security system should work, including its resilience and dependability capabilities, and how changes in conditions, operations, or the environment will affect these outcomes;

Skill in developing and applying security system access controls;

Skill in using network analysis tools to identify vulnerabilities;

Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability);

Knowledge of network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defense-in-depth);

Skill in developing and applying user credential management system;

International certifications in Information Security such as OSCP, CEH, RHCSA, PCNSE, CCNP Security are desirable;

Fluent Azeri and English language skills.