In addition to evaluating each candidate's relative ability, as demonstrated by quality and breadth of experience, the following factors will provide the basis for competitively evaluating each candidate:
• Associate or bachelor’s degree in an information technology related field of study.
• Five (5) years of experience in Information Security Operations.
• Possess of one or more of the following certifications (active):
o Associate of (ISC)2
o Certified Information Systems Security Professional (CISSP)
o Certified Information Security Manager (CISM)
o Certified Information Systems Auditor (CISA)
o CompTIA Security+
o CompTIA PenTest+
o GIAC Information Security Fundamentals
o AWS Certified Solutions Architect Associate
o AWS Certified SysOps Administrator Associate
o Microsoft Certified Azure Administrator
o Microsoft Certified Azure Security Engineer
• Experience with Windows-based operating systems, configurations, Active Directory, and Group Policy.
• Experience managing Endpoint Detection & Response (EDR) solutions such as CrowdStrike and Microsoft Defender.
• Knowledge of cloud computing platforms such as Amazon Web Services or Microsoft Azure.
• Knowledge of penetration testing tools like Burp Suite, Nmap, Nessus, and Wireshark.
• Knowledge of Zero-Trust Networking and Center for Internet Security (CIS) Controls and Benchmarks.
• Knowledge and thorough understanding of NIST, SAM, and SIMM.
• Demonstrated ability to exercise good judgement in the performance of responsibilities, requiring minimal supervision.
• Demonstrate a talent and passion for information security, creativity, and resourcefulness in solving problems.
• Ability to think critically and independently analyze and resolve issues.
• Ability to meet business needs through innovative solutions and demonstrate a service oriented, customer relations-sensitive attitude.
• Ability to establish and maintain cooperative working relationships with all levels of staff and management; communicate effectively with peers, other technical teams, executives, external partners, vendors, and others.
• Ability to manage multiple high priority initiatives in a fast-paced achievement-oriented environment and work under pressure to meet deadlines.
• Ability to maintain confidentiality of sensitive tasks, assignments, and information.
• Ability to prepare and produce clear and concise documentation (e.g., processes and procedures, plans, technical diagrams, information security policies, etc.).
• Exhibit a talent and passion for information security.
• Willingness to work excess hours to achieve business results.
• Display enthusiasm for continuous learning.