Job Knowledge, Skills & Abilities:
• Knowledge of current DOC hardware and software architecture.
• Knowledge of network concepts.
• Knowledge of Windows network environments.
• Advanced knowledge of Active Directory and group privileges.
• Knowledge of all State and DOC security standards, policies and procedures.
• Experience working with security issues in a distributed computing environment.
• Knowledge of network operating system security issues.
• Knowledge and demonstrated work experience with internet / intranet application security issues (e.g. LDAP).
• Advanced problem-solving skills and the ability to make independent judgment decisions or contact appropriate parties to assist.
• Effective oral and written communication skills.
• Knowledge of effective people communication skills.
• Knowledge of project planning.
• Knowledge of products and applications, in order to create effective security roles.
• Ability to multi-task.
• Ability to expedite issues in a timely manner.
• Customer focused, yet firm enough to ensure strict compliance to DOC security policies and procedures.
• Knowledge and demonstrated work experience with security techniques, tools and security infrastructure.
• Ability to communicate clearly and effectively to both technical peers and less technical customers in person and via written media such as e-mail, reports and project charters.
Preferred Skills and 4-7 years of experience in the following:
• Coordination of the account provisioning, de-provisioning, projects and maintenance for DOC platforms and applications.
• Utilize security rules to grant / revoke access to applications, servers, group folders, etc.
• Coordinate activities within the account management staff to provide timely response to customer requests.
• Create and maintain security rules, ensuring that they enforce security standards and policies.
Nice to have Skills:
• Monitoring, auditing and analysis of security systems.
• Provide advice to management on implementing and monitoring Security systems.
• Provide advice to BTM in the design and implementation of policies and procedures to provide an acceptable level of Security systems.
• Identify threats or serious issues regarding user access that may be caused by added new software and systems.
Apply Now
Apply Now