Digital Security Specialist – SC Cleared
Job title
Digital Security Specialist – SC Cleared
Job description
Duration : ASAP- 31-03-23
Candidates must have active SC Clearance that has been used within the last 12 months
Key Essential skills:
• Masters level degree or equivalent level of experience.
In addition, we expect the Post Holder to specialise in one of the following areas:
Cyber Security - Use Case Factory
• Splunk ES Certified Administrators
• SANS SEC487
• SANS SEC504
• SANS SEC511
• SANS FOR578
Cyber Security Principal Analyst CSIRT
• CREST
• SANS GIAC
• SANS GCIH
• CeH
• SANS SEC504
• SANS FOR500
• SANS FOR508
• SANS FOR572
• GIAC GREM
• GIAC GCED
Highly developed specialist knowledge of the processes, tools and techniques of information security management, ability to deploy and monitor information security systems, as well as detect, resolve and prevent violations of IT security, to protect organizational data.
Information Security Technologies
In-depth knowledge of technologies and technology-based solutions dealing with information security issues; ability to apply these in protecting information security across the organization.
Information Security Operation Centre (ISOC)
In-depth knowledge of modules, processes and technologies of Information Security Operation Centre (ISOC); ability to detect, response and utilize related platform and applications to perform cyber security initiatives.
Security Information and Event Management (SIEM)
Extensive knowledge of concept, procedures and processes of Security Information and Event Management (SIEM); ability to utilize related applications to protect organizational networks from cyber risks.
Intrusion Detection and Prevention
Demonstrable knowledge of tools, techniques and processes of intrusion detection and prevention; ability to detect, resolve and prevent intrusion behaviours to protect organizational networks.
In addition, we expect the Post Holder to specialise in one of the following areas:
Cyber Security - Use Case Factory
Application Security
Proven knowledge of the tools and processes for maintaining application security; ability to design and implement security programs to prevent data loss and access intrusion from web and mobile applications.
Information Security Architecture
Working knowledge of the tools and techniques used for creating software, hardware, networking and application infrastructure; ability to meet information security objectives while using these.
Mobile Security
Demonstrable knowledge of the threats, measures and practices of mobile security; ability to reduce mobile risks and protect personal and organizational data and information.
Innovation
Proven understanding of the value of innovation and ability to develop new ideas and initiatives that improve the performance of the organization. Cyber Security – Engineer
Application Security
Demonstrable knowledge of the tools and processes for maintaining application security; ability to design and implement security programs to prevent data loss and access intrusion from web and mobile applications.
Information Security Architecture
Proven knowledge of the tools and techniques used for creating software, hardware, networking and application infrastructure; ability to meet information security objectives while using these.
System Testing Tools
Demonstrable knowledge of and ability to use a variety of tools and techniques for conducting, automating, simplifying and enhancing system testing.
Systems Programming
Extensive knowledge of and ability to design, develop and implement operating systems architecture and components.
Mobile Security
Working knowledge of the threats, measures and practices of mobile security; ability to reduce mobile risks and protect personal and organizational data and information.
Innovation
Proven understanding of the value of innovation and ability to develop new ideas and initiatives that improve the performance of the organization. Cyber Security – Engineer
Application Security
Demonstrable knowledge of the tools and processes for maintaining application security; ability to design and implement security programs to prevent data loss and access intrusion from web and mobile applications.
Information Security Architecture
Proven knowledge of the tools and techniques used for creating software, hardware, networking and application infrastructure; ability to meet information security objectives while using these.
System Testing Tools
Demonstrable knowledge of and ability to use a variety of tools and techniques for conducting, automating, simplifying and enhancing system testing.
Systems Programming
Extensive knowledge of and ability to design, develop and implement operating systems architecture and components.
Mobile Security
Working knowledge of the threats, measures and practices of mobile security; ability to reduce mobile risks and protect personal and organizational data and information.
Innovation
Demonstrable understanding of the value of innovation and ability to develop new ideas and initiatives that improve the performance of the organization.
Cyber Security Principal Analyst CSIRT
Digital Forensic Tools
Expert knowledge of and ability to utilize a variety of specific tools for collecting, analysing, and presenting digital-related evidence.
Computer Forensics
In-depth knowledge of technologies, methods and tools of forensics investigations for IT security violations or potential threats; ability to identify, uncover and evaluate violations, warning reports, suspected incidents and insidious events.
Information Security Audits
Working knowledge of and the ability to utilize tools and techniques for assessing the effectiveness of information security measures, identifying potential risk exposures, and protecting the availability, confidentiality and audit trails of information from destruction or manipulation.
Information Security Administration
Proven knowledge of and ability to develop and implement policies, standards and procedures to ensure the integrity and safety of information.
Digital Threat Management
Extensive knowledge of techniques, approaches and processes of digital threats; ability to detect, monitor, analyse and prevent digital threats.
Endpoint Security
Working knowledge of concepts, issues and techniques of endpoint security; ability to ensure security compliance of endpoint devices in various circumstances.
IT Incident Management
Highly developed specialist knowledge of and ability to investigate, troubleshoot, resolve and prevent the recurrence of incidents that interfere with the normal delivery of IT services.
Information Security Law
Demonstrable knowledge of domestic and international laws governing information security; ability to interpret and take action on the aspects of information security laws that impact the business.
Risk Management
Working knowledge of processes, tools and techniques for assessing and controlling an organization's exposure to risks of various kinds; ability to apply this knowledge appropriately to diverse situations.
Cyber Security Principal Analyst Ops
Information Technology Security Policies
Proven knowledge of IT security policies, standards, and procedures; ability to utilize a variety of administrative skill sets and technical knowledge to ensure cyber security compliance.
Digital Forensic Tools
Expert knowledge of and ability to utilize a variety of specific tools for collecting, analysing, and presenting digital-related evidence.
Information Security Audits
Working knowledge of and the ability to utilize tools and techniques for assessing the effectiveness of information security measures, identifying potential risk exposures, and protecting the availability, confidentiality and audit trails of information from destruction or manipulation.
Information Security Administration
Proven knowledge of and ability to develop and implement policies, standards and procedures to ensure the integrity and safety of information.
Digital Threat Management
Extensive knowledge of techniques, approaches and processes of digital threats; ability to detect, monitor, analyse and prevent digital threats.
Endpoint Security
Working knowledge of concepts, issues and techniques of endpoint security; ability to ensure security compliance of endpoint devices in various circumstances.
IT Incident Management
Highly developed specialist knowledge of and ability to investigate, troubleshoot, resolve and prevent the recurrence of incidents that interfere with the normal delivery of IT services.
Information Security Law
Demonstrable knowledge of domestic and international laws governing information security; ability to interpret and take action on the aspects of information security laws that impact the business.
Risk Management
Working knowledge of processes, tools and techniques for assessing and controlling an organization's exposure to risks of various kinds; ability to apply this knowledge appropriately to diverse situations.
Cyber Security Principal Analyst Ops
Information Technology Security Policies
Proven knowledge of IT security policies, standards, and procedures; ability to utilize a variety of administrative skill sets and technical knowledge to ensure cyber security compliance.
Digital Forensic Tools
Expert knowledge of and ability to utilize a variety of specific tools for collecting, analysing, and presenting digital-related evidence.
Information Security Audits
Working knowledge of and the ability to utilize tools and techniques for assessing the effectiveness of information security measures, identifying potential risk exposures, and protecting the availability, confidentiality and audit trails of information from destruction or manipulation.
Information Assurance
Proven knowledge of and the ability to protect information and information systems while ensuring their confidentiality, integrity and availability.
Digital Threat Management
Extensive knowledge of techniques, approaches and processes of digital threats; ability to detect, monitor, analyse and prevent digital threats.
Data Privacy
Working knowledge of and ability to protect an organization's data to ensure privacy during the process of storage and communication.
Big Data Computing
Proven knowledge of and experience with capturing, manipulating, sharing and interpreting large amounts of data from multiple and diverse sources.
Innovation
Demonstrable understanding of the value of innovation and ability to develop new ideas and initiatives that improve the performance of the organization.
If you feel you have the skills and experience needed for this role; please do apply now.