Posted in Other 13 days ago.
Special Instructions Summary
DNP-CB
DNP-I
Department
UITS CNTR FOR APPL CYBERSECURI (UA-DCAC-IUBLA)
Job Summary
Works independently, performs analysis of cybersecurity risk on supported research systems, software, and networks. Develops alert, notification, and other information products based on that analysis. Collects, analyzes, and disseminates analysis regarding software vulnerabilities, risks to network and systems infrastructure, and relevant threats. Responds to requests for security analysis; writes reports, papers or other products as required.
Develops information products. Develops and maintains security processes and supporting tools to improve the field of cybersecurity generally, and within the communities we serve. Gives presentations and trainings, writes papers and other training materials. Represents the University nationally, both in the cybersecurity community and the communities we serve.
Responds to cybersecurity incidents that affect supported networks or that have widespread impact. Responds to incidents of computer security breaches and other incidents involving the use of technology, and provides advice to and/or participates in the collection of technical evidence as required. Designs and carries out cybersecurity exercises to test response in simulated scenarios, internal to the University or with external partners.
Contributes to cybersecurity policies and practices for team members or outside collaborators, understanding the security needs of devices, networks, and software, which may be novel, and clearly communicates relevant information to collaborators who are not themselves cybersecurity experts.
Undertake professional development to advance skills in support of University activities.
Qualifications
Bachelors Degree in Computer Science or related field.
2 or more years of information security performing ongoing analysis and monitoring of technology environments to identify security exposures and potential threats. Including experience in all the following areas:
2 years of experience using VirusTotal for threat hunting, analyzing, and mitigation of malware and viruses;
2 years of experience using SIEM tools to analyzing security logs. Specifically IBM QRadar and HP ArcSight;
2 years of experience conducting internal process training and presentations;
Experience using Cisco tools to detect and mitigate security threats, specifically FireAMP and Sourcefire;
Experience using Qualys and Nessus to run and analyze vulnerability scan reports;
1 year of experience utilizing Information Technology Infrastructure Library (ITIL) framework to establish best practices for the delivery of IT Services.
1 year of experience drafting and maintaining security standard operating procedure (SOP) documents for both internal and external users;
1 year of experience developing phishing educational materials and running phish simulation training for both internal and external end users using Cofense PhishMe;
1 year of experience analyzing phishing/spam emails by email headers, performing IP reputation check using mxtoolbox.com; and accordingly whitelisting/blacklisting domains.
Working Conditions / Demands
This role requires the ability to effectively communicate and to operate a computer and other standard office productivity equipment. The position involves sedentary work as well as periods of time moving around an office environment and the campus. The person in this role must be able to perform the essential functions with or without an accommodation.
Work Location
This position is eligible for remote work or to work in the office, subject to change in the future based on University policy and business needs.
Benefits Overview
For full-time staff employees, Indiana University offers a wide array of benefits including:
Veolia North America |
SHINE Management Inc |
Indiana University |