Logo
American Business Solutions

American Business Solutions is hiring: Cybersecurity Engineer in Richmond

American Business Solutions, Richmond, VA, US, 23214

Save Job

Engagement Type

Contract

Required Skills & Qualifications:

Skill

|

Required / Desired / Preferred

|

Amount of Experience

|

Considerable knowledge and hands

on experience in the areas of information systems security of security policy

|

Required

|

7+ Years

|

Considerable knowledge and hands

on experience with web security gateways, network access control, endpoint

security, and perimeter security technologies.

|

Required

|

7+ Years

|

Considerable knowledge and hands

on experience with firewalls, anti-virus software, anti-malware,

anti-phishing, authentication systems.

|

Required

|

7+ Years

|

Considerable knowledge and hands

on experience with intrusion detection/prevention systems, log analysis and

management, web content filtering

|

Required

|

7+ Years

|

Considerable knowledge and

experience with network protocols and security/authentication protocols at

all layers of the OSI model with emphasis on TCP/IP

|

Required

|

7+ Years

|

Demonstrated ability to identify

security risks across the enterprise and perform the day-to-day operation,

management and administration to protect the integrity, confidentiality, and

availability of information assets and technology infrastructure.

|

Required

|

7+ Years

|

Considerable knowledge and hands

on experience detecting, responding, remediating security incidents.

|

Required

|

7+ Years

|

Considerable knowledge and hands

on experience remediating System Security Plans (SSP) and Risk Assessment

(RA) in cybersecurity

|

Required

|

7+ Years

|

Solid experience with performing

threat; vulnerability and risk assessment; and coordinating the handling and

resolution of incidents related to security breaches at an enterprise level

required.

|

Required

|

7+ Years

|

Considerable knowledge and hands

on experience with web related technologies and penetration testing tools

|

Required

|

7+ Years

|

CISSP

|

Preferred

|

N/A

|

Required/Desired Skills

Skill Required/Desired Amount of Experience Considerable knowledge and hands on experience in the areas of information systems security of security policy Required 7.0 Years Considerable knowledge hands on experience with web security gateways, network access control, endpoint security, and perimeter security technologies. Required 7.0 Years Considerable knowledge and hands on experience with firewalls, anti-virus software, anti-malware, anti-phishing, authentication systems. Required 7.0 Years Considerable knowledge and hands on experience with intrusion detection/prevention systems, log analysis and management, web content filtering Required 7.0 Years Considerable knowledge and experience with network protocols and security/authentication protocols at all layers of OSI model with emphasis on TCP/IP Required 7.0 Years Demonstrated ability to identify security risks across the enterprise and perform the day-to-day operation. Required 7.0 Years Demonstrated ability to administer and protect the integrity, confidentiality, and availability of information assets and technology infrastructure Required 7.0 Years Considerable knowledge and hands on experience detecting, responding, remediating security incidents. Required 7.0 Years Considerable knowledge and hands on experience remediating System Security Plans (SSP) and Risk Assessment (RA) in cybersecurity Required 7.0 Years Solid experience with performing threat; vulnerability, risk assessment and coordinating the resolution of incidents related to security breaches. Required 7.0 Years Considerable knowledge and hands on experience with web related technologies and penetration testing tools Required 7.0 Years CISSP Highly desired Years

Skills:

network access control, endpoint security, and perimeter security technologies., Considerable knowledge and hands on experience with firewalls, anti-virus software, anti-malware, anti-phishing, authentication systems., log analysis and management, web content filtering, Demonstrated ability to administer and protect the integrity, confidentiality, and availability of information assets and technology infrastructure, Considerable knowledge and hands on experience detecting, responding, remediating security incidents., Solid experience with performing threat; vulnerability, CISSP