Job Details
Experience Needed:
Career Level:
Education Level:
Salary:
Job Categories:
Skills And Tools:
Job Description
Job Description:
- Coordinate with Cyber Defense Analysts to manage and administer the updating of rules and signatures (e.g., intrusion detection/protection systems, antivirus, and content blacklists) for specialized cyber defense applications.
- Perform system administration on specialized cyber defense applications and systems (e.g., antivirus, audit and remediation) or Virtual Private Network (VPN) devices, to include installation, configuration, maintenance, backup, and restoration.
- Assist in identifying, prioritizing, and coordinating the protection of critical cyber defense infrastructure and key resources.
- Build, install, configure, and test dedicated cyber defense hardware.
- Assist in assessing the impact of implementing and sustaining a dedicated cyber defense infrastructure.
- Administer test bed(s), and test and evaluate applications, hardware infrastructure, rules/signatures, use cases, and configurations of platforms managed by service provider(s).
- Create, edit, and manage network directives and rules on specialized cyber defense systems (e.g., firewalls and intrusion prevention systems).
- Identify potential conflicts with implementation of any cyber defense tools (e.g., tool and signature testing and optimization).
- Implement Risk Management Framework (RMF)/Security Assessment and Authorization (SA&A) requirements for dedicated cyber defense systems within the enterprise, and document and maintain records for them.
Job Requirements
Job Requirements:
- Linux/Unix system administration.
- Network systems (LAN/WAN) CCNA is preferred.
- Virtualization deployment and maintenance (VMware and/or HyperV)
- Using Virtual Private Network (VPN) devices and encryption.
- Applying HIDS/NIDS deployment and tuning.
- Cloud infrastructure (basic).
- Using Incident handling methodologies.
- Databases (SQL, MongoDB , etc ) is highly recommended.
- System, network, and OS hardening techniques. (e.g., remove unnecessary services, password policies, network segmentation, enable logging, least privilege, etc.).
- Troubleshooting and diagnosing cyber defense infrastructure anomalies and work through resolution.
- Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Featured Jobs
Similar Jobs
- Sales Engineer (CCTV and secur...Optima for engineering designs and real estate - New Cairo, Cairo22 days ago