Job opening: Information Technology Specialist (Security)
Salary: $112 015 - 172 075 per year
Published at: Sep 07 2023
Employment Type: Full-time
Division Overview: This position is located in the Division of Information Technology of the Public Defender Service (PDS) for the District of Columbia.
Duties
PDS's Information Technology Division is responsible for the planning, development and management of all information technology systems and subsystems that support PDS programs and management operations and for the development, maintenance and oversight of policies, standards and procedures relating to agency information technology programs and activities. The Office assesses PDS technology requirements; analyzes potential return on technology investment for internal systems and for PDS interfaces with external systems; and designs and administers system configuration and architecture including hardware and software, telecommunications, network operations, desktop systems, and system security. The IT Security Analyst performs two core functions for the enterprise. The first is the day-to-day operations of the in-place security solutions while the second is the identification, investigation, and resolution of security breaches detected by those systems. Secondary tasks may include involvement in the implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines, and procedures as well as conducting vulnerability audits and assessments. The IT Security Analyst is expected to be fully aware of the enterprise's security goals as established by its stated policies, procedures, and guidelines and to actively work towards upholding those goals.
Responsibilities
Strategy & Planning
Participate in the planning and design of enterprise security architecture, under the direction of the Chief Information Officer, where appropriate.
Participate in the creation of enterprise security documents (policies, standards, baselines, guidelines, and procedures) under the direction of the Chief Information Officer, where appropriate.
Participate in the planning, design and implementation of an enterprise business continuity plan and disaster recovery plan, under the direction of the Chief Information Officer, where appropriate.
Create and manage an incident response plan.
Acquisition & Deployment
Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes, and the development of new attacks and threat vectors.
Recommend additional security solutions or enhancements to existing security solutions to improve overall enterprise security.
Perform the deployment, integration, and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise's security documents specifically.
Select and acquire additional security solutions or enhancements to existing security solutions to improve overall enterprise security as per the enterprise's existing procurement processes.
Perform regular security awareness training for all employees to ensure consistently high levels of compliance with enterprise security documents.
Operational Management
Maintain up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e. security tools) or not (e.g. workstations, servers, network devices).
Oversee and manage the vulnerability management program from the emergence of new security vulnerabilities to the remediation of vulnerabilities.
Ensure the enforcement of enterprise security documents.
Facilitate the deployment, management, and maintenance of all security systems and their corresponding or associated software, including firewalls, intrusion detection systems, cryptography systems, and anti-virus software.
Maintain operational configurations of all in-place security solutions as per the established baselines.
Monitor all in-place security solutions for efficient and appropriate operations.
Monitor server logs, firewall logs, intrusion detection logs, and network traffic for unusual or suspicious activity. Interpret activity and make recommendations for resolution.
Recommend, schedule (where appropriate), and apply fixes, security patches, disaster recovery procedures, and any other measures required in the event of a security breach.
Design, implement, and report on security system and end user activity audits.
Review logs and reports of all in-place devices, whether they be under direct control (i.e. security tools) or not (e.g. workstations, servers, network devices). Interpret the implications of that activity and devise plans for appropriate resolution.
Participate in investigations into problematic activity.
Participate in the design and execution of vulnerability assessments, penetration tests, and security audits.
Provide on-call support for end users for all in-place security solutions.
Qualifications
5 years of experience.
Education
College experience can be substituted for 10+ yrs. of experience.
Contacts
- Address Public Defender Service for District of Columbia
633 Indiana Ave., NW
Washington, DC 20004
US
- Name: Public Defender Service
- Email: [email protected]
Map