USNLX Ability Jobs

USNLX Ability Careers

Job Information

The Delaware River and Bay Authority Cyber Security Specialist in New Castle, Delaware

This job was posted by https://joblink.delaware.gov : For more information, please see: https://joblink.delaware.gov/jobs/1304869

CYBER SECURITY SPECIALIST

Location: Delaware Memorial Bridge, New Castle, DE

\$94,039 to \$113,300 annualized (Grade H)

(Position and Salary commensurate with experience and skills)

Opening Date: March 28, 2024 Closing Date: Until Filled

I. POSITION SUMMARY

The Cyber Security Specialist is responsible for preemptively identifying security issues that

pose a potential threat or an immediate risk to the Delaware River and Bay Authoritys

(Authority) business operations, employees, customers, and vendors. The position reports to the

Director of ITS and has the responsibility for the creation of a comprehensive data security

program for the Authoritys system. Responsibilities will include developing security protocols,

solutions, analyzing current systems for vulnerabilities, and handling all cyberattacks in an

efficient and effective manner. The Cyber Security Specialist is also involved in the

management to effectively detect malicious software and hardware that might be present on the

network; designing and coordinating penetration testing; carrying out security reviews or/and

audits of existing and newly acquired systems; making recommendations on internal controls

and security; and executing information security risk assessment annually. The Cyber Security

Specialist is responsible for following established safety practices while performing assigned

duties to protect self, co-workers, and the public from personal injury and to prevent damage to

Authority property. This position is subject to 24 hours on call in the event of a cyber security

incident.

II. ESSENTIAL DUTIES AND RESPONSIBILITIES

Safeguards information system assets by identifying and solving potential and actual

security problems.

Protects systems by defining access privileges, control structures, resources, and proper

configuration of security solutions applied in the protection of Authoritys assets.

Implements configuration and maintenance of the Cybersecurity Incident Response Plan

to effectively identify and alert upon potential security events.

Participates in the investigations being performed as part of the Cybersecurity Incident

Response Team; documenting, and maintaining accurate, and detailed records of the

incident and all activities that were undertaken in response to an incident.

Implements security improvements by assessing current situation, evaluating trends, and

anticipating requirements.

Determines security violations and inefficiencies by conducting periodic audits.

Upgrades systems by implementing and maintaining security controls.

Interfaces with vendor support service groups for contract renewals and to ensure proper

escalation as required.

Ensures that all solutions set up for security and monitoring can effectively monitor and

report upon security events happening within the environment by assigning security

solution agents to devices and systems.

Initiates and produces custom scripts needed to make logging and alerting requirements

easy and effective.

Participates in the process of selecting and reviewing information security solutions.

Assists in the configuration of intrusion detection and prevention solutions based in the

host and network servers to effectively identify potential security incidents.

Updates job knowledge by participating in educational opportunities; reading

professional publications; maintaining personal networks; participating in professional

organizations.

Provides the highest level of customer service and professionalism to all internal and

external customers.

III. REQUIRED KNOWLEDGE, SKILLS, AND ABILITIES

Must possess a high ethical and moral character as privileged acces s to confidential data

will be an essential component of the job function.

Experience in information security, specifically with penetration testing, intrusion

detection, incident response or digital forensics.

Deep knowledge and understanding of the various ways attacks are carried out against a

system or network and how to effectively detect them.

Advanced understanding of TCP/IP, common networking ports and protocols, traffic

flow, system administration, OSI model, defense-in-depth, and common security

elements.

Experience with vulnerability scanning solutions.

\<

DirectEmployers