In addition to evaluating each candidate's relative ability, as demonstrated by quality and breadth of experience, the following factors will provide the basis for competitively evaluating each candidate:
Knowledge of:
• Cybersecurity principles, including risk assessment and mitigation strategies.
• IT security policies, particularly state-level compliance requirements.
• Employee transition processes for secure account and data access management.
• System remediation techniques, including patching and access control methods.
• Active Directory configuration and secure management practices.
• Security auditing processes to identify anomalies and misconfigurations.
• Audiovisual (AV) system operations and maintenance requirements.
• IT equipment functionality, including PCs, peripherals, and productivity software.
• Incident resolution protocols for handling security-related tickets.
• Documentation standards for audit findings and corrective action reporting.
Ability to:
• Assess and mitigate risks to devices and user accounts effectively.
• Deactivate accounts and update permissions during employee transitions.
• Apply patches and implement lockdowns on compromised systems.
• Repair and maintain IT equipment, including but not limited to, PCs and peripheral devices.
• Create, configure, and update Active Directory profiles securely.
• Conduct audits to detect security issues and propose corrective actions.
• Set up, troubleshoot, and maintain AV equipment for events reliably.
• Manage multiple ticket-driven tasks with effective time management.
• Communicate clearly with team members to resolve incidents.
• Document findings and actions with precision and clarity.