DevSecOps engineer Telecom
012 -5961868

Job Description

Responsibilities :

Diagnose and resolve customer reported system incidents. 
Conduct analysis of log files, evidence, and other information in order to determine best methods for identifying the perpetrator(s) of a network intrusion. 
Administer Enterprise Network Defense (END) test bed(s), and test and evaluate new cyber defense applications, rules/signatures, access controls, and configurations of platforms managed by service provider(s). 
Assist in identifying, prioritizing, and coordinating the protection of critical Enterprise Network Defense (END) infrastructure and key resources. 
Coordinate with Enterprise Network Defense (END) Analysts to manage and administer the updating of rules and signatures (e.g., intrusion detection/protection systems, anti-virus, and content blacklists) for specialized cyber defense applications.
Create, edit, and manage changes to network access control lists on specialized Enterprise Network Defense (END) systems (e.g., firewalls and intrusion prevention systems). 
Identify potential conflicts with implementation of any cyber defense tools within the Enterprise Network Defense (END) provider area of responsibility (e.g., tool and signature testing and optimization). 
Implement Risk Management Framework (RMF)/Security Assessment and Authorization (SA&A) requirements for specialized Enterprise Network Defense (END) systems within the enterprise, and document and maintain records for them.   
Perform system administration on specialized Enterprise Network Defense (END) applications and systems (e.g., anti-virus, audit and remediation) to include installation, configuration, maintenance, backup and restoration. 
Serve as security expert and liaison to law enforcement personnel and explain incident details as required. 
Oversees and ensures that the appropriate operational security posture (e.g., network and system security, physical and environmental protection, personnel security, incident handling, security training and awareness) is implemented and maintained for an information system or program. Advises the Authorizing Official (AO), an information system owner, or the Internal and Information Security Division Director on the security of an information system or program. 
Develops, modifies, enhances, and sustains new or existing computer applications, software, or utility programs following software security best practices throughout the software lifecycle.   
Installs, configures, troubleshoots, and maintains server and systems configurations (hardware and software) in Information Security environment and in supportive secuirty systems to ensure their confidentiality, integrity, and availability. Administers server-based systems, security devices, distributed applications, network storage, messaging, and performs systems monitoring. Consults on network, application, and customer service issues to support computer systems’ security and sustainability. 
Develops technical security solutions to meet the defined requirements. 
Conducts and documents the systems integration, testing, operations, maintenance, and security of an information security environment and of DevSecOps systems in relevance. Coordinates threat and mitigation strategies across the enterprise. 
Collaborate with stakeholders to identify and/or develop appropriate Information Security solutions technology. 
Conduct continuous analysis to identify network and system vulnerabilities. 
Develop centralized cryptographic key management capability to support mobile workforce. /
Identify and/or develop reverse engineering tools to detect cyberspace vulnerabilities. 
Identify cyber capabilities strategies for custom hardware and software development based on mission requirements. 
Identify functional- and security-related features to find opportunities for new capability development to exploit or mitigate cyberspace vulnerabilities. 
Develops and conducts processes and procedures (e.g., testing) to evaluate compliance with security requirements. 

Requirements :

Minimum Bachelor’s Degree in Information Technology, Computer Science, Information Security or Applied Mathematic  or at least 3 year experience in Information Security. 
3+ years’ experience in Information Technologies, Telecommunication or İnformation Security sphere
Azeri(fluent), English(fluent) Russian (İntermediate) 

1. Knowledge of computer networking concepts and protocols, and network security methodologies. 
2. Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
3. Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. 
4. Knowledge of cybersecurity principles.
5. Knowledge of cyber threats and vulnerabilities. 
6. Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
7. Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]).
8. Knowledge of cryptography and cryptographic key management concepts.
9. Knowledge of database systems.
10. Knowledge of electrical engineering as applied to computer architecture, including circuit boards, processors, chips, and associated computer hardware.
11. Knowledge of embedded systems and internet of things.
12. Knowledge of fault tolerance.
13. Knowledge of how system components are installed, integrated, and optimized.
14. Knowledge of human-computer interaction principles.
15. Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins.
16. Knowledge of information secuirty principles and organizational requirements to protect confidentiality, integrity, availability, authenticity, and non-repudiation of information and data.
17. Knowledge of information theory, including source coding, channel coding, algorithm complexity theory, and data compression.
18. Knowledge of information security principles and methods (e.g., firewalls, demilitarized zones, encryption).
19. Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, and statistics.
20. Knowledge of microprocessors.
21. Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).
22. Knowledge of network design processes, including security objectives, operational objectives, and tradeoffs.
23. Knowledge of operating systems.
24. Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP], Open System Interconnection model [OSI]).
25. Knowledge of parallel and distributed computing concepts.
26. Knowledge of secure configuration management techniques.
27. Knowledge of key concepts in security management (e.g., Release Management, Patch Management).
28. Knowledge of security system design tools, methods, and techniques.
29. Knowledge of software engineering.
30. Knowledge of systems testing and evaluation methods.
31. Knowledge of key telecommunication concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers).
32. Skill in assessing the robustness of security systems and designs.
33. Skill in designing countermeasures to identified security risks.
34. Skill in designing security controls based on information security principles and tenets.
35. Skill in determining how a security system should work, including its resilience and dependability capabilities, and how changes in conditions, operations, or the environment will affect these outcomes.
36. Skill in developing and applying security system access controls.
37. Skill in evaluating the adequacy of security designs.
38. Knowledge of interpreted and compiled computer languages.
39. Skill in using network analysis tools to identify vulnerabilities.
40. Knowledge of Personally Identifiable Information (PII) data security standards.
41. Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability).
42. Skill in evaluating the trustworthiness of the supplier and/or product.
43. Knowledge of network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defense-in-depth).
44. Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
45. Skill in developing and applying user credential management system.
46. Skill in implementing enterprise key escrow systems to support data-at-rest encryption.