jobs board

Digital Security Specialist – SC Cleared

Job title

Digital Security Specialist – SC Cleared

Job description

Duration : ASAP- 31-03-23

Candidates must have active SC Clearance that has been used within the last 12 months

Key Essential skills:

• Masters level degree or equivalent level of experience.

In addition, we expect the Post Holder to specialise in one of the following areas:

Cyber Security - Use Case Factory

• Splunk ES Certified Administrators

• SANS SEC487

• SANS SEC504

• SANS SEC511

• SANS FOR578

Cyber Security Principal Analyst CSIRT

• CREST

• SANS GIAC

• SANS GCIH

• CeH

• SANS SEC504

• SANS FOR500

• SANS FOR508

• SANS FOR572

• GIAC GREM

• GIAC GCED

Highly developed specialist knowledge of the processes, tools and techniques of information security management, ability to deploy and monitor information security systems, as well as detect, resolve and prevent violations of IT security, to protect organizational data.

Information Security Technologies

In-depth knowledge of technologies and technology-based solutions dealing with information security issues; ability to apply these in protecting information security across the organization.

Information Security Operation Centre (ISOC)

In-depth knowledge of modules, processes and technologies of Information Security Operation Centre (ISOC); ability to detect, response and utilize related platform and applications to perform cyber security initiatives.

Security Information and Event Management (SIEM)

Extensive knowledge of concept, procedures and processes of Security Information and Event Management (SIEM); ability to utilize related applications to protect organizational networks from cyber risks.

Intrusion Detection and Prevention

Demonstrable knowledge of tools, techniques and processes of intrusion detection and prevention; ability to detect, resolve and prevent intrusion behaviours to protect organizational networks.

In addition, we expect the Post Holder to specialise in one of the following areas:

Cyber Security - Use Case Factory

Application Security

Proven knowledge of the tools and processes for maintaining application security; ability to design and implement security programs to prevent data loss and access intrusion from web and mobile applications.

Information Security Architecture

Working knowledge of the tools and techniques used for creating software, hardware, networking and application infrastructure; ability to meet information security objectives while using these.

Mobile Security

Demonstrable knowledge of the threats, measures and practices of mobile security; ability to reduce mobile risks and protect personal and organizational data and information.

Innovation

Proven understanding of the value of innovation and ability to develop new ideas and initiatives that improve the performance of the organization. Cyber Security – Engineer

Application Security

Demonstrable knowledge of the tools and processes for maintaining application security; ability to design and implement security programs to prevent data loss and access intrusion from web and mobile applications.

Information Security Architecture

Proven knowledge of the tools and techniques used for creating software, hardware, networking and application infrastructure; ability to meet information security objectives while using these.

System Testing Tools

Demonstrable knowledge of and ability to use a variety of tools and techniques for conducting, automating, simplifying and enhancing system testing.

Systems Programming

Extensive knowledge of and ability to design, develop and implement operating systems architecture and components.

Mobile Security

Working knowledge of the threats, measures and practices of mobile security; ability to reduce mobile risks and protect personal and organizational data and information.

Innovation

Proven understanding of the value of innovation and ability to develop new ideas and initiatives that improve the performance of the organization. Cyber Security – Engineer

Application Security

Demonstrable knowledge of the tools and processes for maintaining application security; ability to design and implement security programs to prevent data loss and access intrusion from web and mobile applications.

Information Security Architecture

Proven knowledge of the tools and techniques used for creating software, hardware, networking and application infrastructure; ability to meet information security objectives while using these.

System Testing Tools

Demonstrable knowledge of and ability to use a variety of tools and techniques for conducting, automating, simplifying and enhancing system testing.

Systems Programming

Extensive knowledge of and ability to design, develop and implement operating systems architecture and components.

Mobile Security

Working knowledge of the threats, measures and practices of mobile security; ability to reduce mobile risks and protect personal and organizational data and information.

Innovation

Demonstrable understanding of the value of innovation and ability to develop new ideas and initiatives that improve the performance of the organization.

Cyber Security Principal Analyst CSIRT

Digital Forensic Tools

Expert knowledge of and ability to utilize a variety of specific tools for collecting, analysing, and presenting digital-related evidence.

Computer Forensics

In-depth knowledge of technologies, methods and tools of forensics investigations for IT security violations or potential threats; ability to identify, uncover and evaluate violations, warning reports, suspected incidents and insidious events.

Information Security Audits

Working knowledge of and the ability to utilize tools and techniques for assessing the effectiveness of information security measures, identifying potential risk exposures, and protecting the availability, confidentiality and audit trails of information from destruction or manipulation.

Information Security Administration

Proven knowledge of and ability to develop and implement policies, standards and procedures to ensure the integrity and safety of information.

Digital Threat Management

Extensive knowledge of techniques, approaches and processes of digital threats; ability to detect, monitor, analyse and prevent digital threats.

Endpoint Security

Working knowledge of concepts, issues and techniques of endpoint security; ability to ensure security compliance of endpoint devices in various circumstances.

IT Incident Management

Highly developed specialist knowledge of and ability to investigate, troubleshoot, resolve and prevent the recurrence of incidents that interfere with the normal delivery of IT services.

Information Security Law

Demonstrable knowledge of domestic and international laws governing information security; ability to interpret and take action on the aspects of information security laws that impact the business.

Risk Management

Working knowledge of processes, tools and techniques for assessing and controlling an organization's exposure to risks of various kinds; ability to apply this knowledge appropriately to diverse situations.

Cyber Security Principal Analyst Ops

Information Technology Security Policies

Proven knowledge of IT security policies, standards, and procedures; ability to utilize a variety of administrative skill sets and technical knowledge to ensure cyber security compliance.

Digital Forensic Tools

Expert knowledge of and ability to utilize a variety of specific tools for collecting, analysing, and presenting digital-related evidence.

Information Security Audits

Working knowledge of and the ability to utilize tools and techniques for assessing the effectiveness of information security measures, identifying potential risk exposures, and protecting the availability, confidentiality and audit trails of information from destruction or manipulation.

Information Security Administration

Proven knowledge of and ability to develop and implement policies, standards and procedures to ensure the integrity and safety of information.

Digital Threat Management

Extensive knowledge of techniques, approaches and processes of digital threats; ability to detect, monitor, analyse and prevent digital threats.

Endpoint Security

Working knowledge of concepts, issues and techniques of endpoint security; ability to ensure security compliance of endpoint devices in various circumstances.

IT Incident Management

Highly developed specialist knowledge of and ability to investigate, troubleshoot, resolve and prevent the recurrence of incidents that interfere with the normal delivery of IT services.

Information Security Law

Demonstrable knowledge of domestic and international laws governing information security; ability to interpret and take action on the aspects of information security laws that impact the business.

Risk Management

Working knowledge of processes, tools and techniques for assessing and controlling an organization's exposure to risks of various kinds; ability to apply this knowledge appropriately to diverse situations.

Cyber Security Principal Analyst Ops

Information Technology Security Policies

Proven knowledge of IT security policies, standards, and procedures; ability to utilize a variety of administrative skill sets and technical knowledge to ensure cyber security compliance.

Digital Forensic Tools

Expert knowledge of and ability to utilize a variety of specific tools for collecting, analysing, and presenting digital-related evidence.

Information Security Audits

Working knowledge of and the ability to utilize tools and techniques for assessing the effectiveness of information security measures, identifying potential risk exposures, and protecting the availability, confidentiality and audit trails of information from destruction or manipulation.

Information Assurance

Proven knowledge of and the ability to protect information and information systems while ensuring their confidentiality, integrity and availability.

Digital Threat Management

Extensive knowledge of techniques, approaches and processes of digital threats; ability to detect, monitor, analyse and prevent digital threats.

Data Privacy

Working knowledge of and ability to protect an organization's data to ensure privacy during the process of storage and communication.

Big Data Computing

Proven knowledge of and experience with capturing, manipulating, sharing and interpreting large amounts of data from multiple and diverse sources.

Innovation

Demonstrable understanding of the value of innovation and ability to develop new ideas and initiatives that improve the performance of the organization.

If you feel you have the skills and experience needed for this role; please do apply now.



This website uses cookies to ensure you get the best experience on our website. By continuing you agree to the terms as specified in our cookie policy