|Date Posted||August 8, 2019|
***Must be familiar with NIST Frameworks (Risk Management Framework, Cybersecurity Framework). Must be familiar with security controls. Must be familiar with creating framework overlays based on environment, criticality, etc. Note - most of this job description does not apply. I do not need someone who can run security tools. This position is focused on mapping controls, based on various standards, to frameworks based on several factors, as listed above.
At a senior level, maintains and operates a variety of security measures and software that perform cybersecurity functions such as access control, monitoring or vulnerability assessment. Provides support to the end-user community and ensures they have up-to-date protection from malicious software and other cyber threats. Tests and recommends security measures to remediate and mitigate risk. Provides reports and other information related to information security issues as requested by management and other groups. Performs evaluation and analysis of security applications and systems and makes recommendations to management. Recommends best practices to ensure system security across the enterprise. This position utilizes in-depth knowledge of best practices and experience in own discipline to provide and improve services. Takes a new perspective to solve complex problems. Works independently and receives minimal guidance. Acts as a resource for colleagues with less experience. May direct the work of other staff members.- Performs risk assessments and recommends security measures.- Monitors security systems for possible intrusion.- Interacts with end users concerning malware, spam, vulnerabilities and any other cybersecurity issues.- Reviews and creates audit reports on user and system activities.- Reviews system generated logs for anomalies and takes appropriate actions. - Actively probes the network for new threats and risks.- Documents, deploys, reviews and maintains cybersecurity policies, standards, guidelines and procedures. - Plans and implements cybersecurity technology projects. - Provides business continuity/disaster recovery and risk analysis expertise.- Monitors security alerts on internet and other intelligence feeds and determines whether reported threats could impact client information technology or operational technology systems.- Provides technical consulting to other groups on cybersecurity requirements. - Implements and ensures technical security systems including SIEM, VAT, network IDS, antivirus, web and email filters and firewalls.- Implements and ensures technical security compliance solutions for NERC, PCI, FBI CJIS, HIPAA and other regulatory requirements.- Performs cybersecurity incident response activities.- Documents and maintains objective evidence to demonstrate NERC CIP regulatory compliance.- Creates and delivers security training materials and classes for asset owners, software developers and system administrators.- Provides oversight regarding compliance with security regulations, standards and laws.- Performs work by traveling independently or with a small team to various locations (substations, power plants, water systems, etc.) as scheduled.- For incumbents performing as a Cyber Security Coordinator (CSC) – A CSC is responsible for the following: - Works with the NERC Compliance Department and Cybersecurity Department to ensure that the necessary processes and procedures applicable to each NERC CIP system are developed and implemented within their respective group; reviews projects relating to the NERC CIP systems which may have a regulatory impact, and makes sure the drawings and documents for that system are updated and stored as required; coordinates NERC compliance implementation, communication, and ensures that users of the respective systems have the necessary training; continually monitors implementation efforts and reporting potential violations to the NERC Compliance Manager and respective management; communicates with the Cybersecurity Manager concerning cybersecurity concerns or actual incidents; and maintains documentation of objective evidence, including Reliability Standard Audit Worksheets (RSAWs) to demonstrate NERC CIP regulatory compliance.This general overview only includes essential functions of the job and does not imply that these are the only duties to be performed by the employee occupying this position. Employees will be required to follow any other job-related instruction and to perform any other job-related duties requested by supervisor or management.
Apex Systems is an equal opportunity employer. We do not discriminate or allow discrimination on the basis of race, color, religion, creed, sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), age, sexual orientation, gender identity, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, disability, status as a crime victim, protected veteran status, political affiliation, union membership, or any other characteristic protected by law. Apex will consider qualified applicants with criminal histories in a manner consistent with the requirements of applicable law. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation in using our website for a search or application, please contact our Employee Services Department at 844-463-6178