Cyber Security System Engineer
Brussels
Applications have closed
Delivery mode: remote and local
Seniority: Expert
Description
The purpose of the Services is to manage (implement, integrate, configure and administer) cyber security components in order to support the provision of operational security services.
The Service provider is expected to take direct action on all or part of a cyber defence infrastructure and to act as the main interface between business and technical units.
The aim of the Services is to support the provision of other services such as security analysis and incident handling, and carry out fine-tuned configuration and customization of cyber defence components in order to maximize their effi-ciency and performance whilst minimizing the amount of false positive detection ratio.
Tasks
ITIL process implementation and improvement
Installs, configures, maintains and upgrades cyber security components
Monitor managed components and manage incidents and problems (ITIL definitions)
Tune performances
Perform day-to-day system management such as user access management, patch management
Harden system and network components
Develop, maintain and roll-out reference configurations (ITIL release and deployment management)
Implement and follow security policies
Elaborate and maintain system inventory/CMDB, system documentation, operating procedures
Ensure appropriate testing before applying changes (change evaluation)
Manage changes through a structured change management process (ITIL Change management)
Report on service performances and availability, produce dashboards
Design, develop, install, configure, test, monitor, maintain, troubleshoot and upgrade cyber security infrastructure
Provide expertise, guidance, recommendations and documented security configurations for implementation of security tools and processes
Produce detailed engineering specifications
Evaluate and recommend secure configurations
Identify security requirements, based upon need or translate high-level security requirements into detailed technical requirements
Support various technical and non-technical stakeholders to specify and negotiate security requirements
Interact with network and system engineering teams to effectively communicate and develop security solutions
Drafts documentation and standard operational procedures to support security systems operations
Ensures the technical design and contributes to implementation of new components and/or enhancements in coordination with other team members in particular project managers, security architects and engineers.
Ensure DRP through appropriate back-ups methods to ensure RTO are met.
Ensure capacity planning
Support security monitoring use-case engineering
Security events collection technical design. Integration of log sources into a SIEM solution.
Elaboration and translation of the security monitoring policy into monitoring rules
Investigate, diagnose and solve system related problems
Schedule installation work, liaising with all concerned to ensure that installation priorities are met and disrup-tion to the organization is minimized.
Diagnose and solve problems and faults occurring in the operation of cyber security components
Comply with organization procedures to ensure integrity of the system
Recommend resolutions and improvements
Provide integrated solutions
Provide consolidate findings on components or processes
Document cyber defence components configurations
Ensure that systems meet agreed service levels
Ensure that communication performance, recovery, and security needs meet agreed service agreement standards
Contribute to define network design policies, philosophies and criteria
Craft, fine-tune and validate low level intrusion detection rules for network and host protection
Development, test and roll-out new releases of Identity and Access Management solutions
Key Requirements:
- Network security engineering
- System security engineering
- Network security administration
- System security administration
- Security testing (functional and non-functionnal)
- Cryptography
- ISO2700X
- ITIL
- Ability to design, develop, install, configure, test, monitor, maintain, troubleshoot and upgrade at least one of the products mentioned in Annex 6_SP4 Ap-pendix 1 List of Core products and solutions
- Network Protocols (including IP, TCP, UDP, DNS, SMTP, Syslog-ng, HTTP, IP routing and fail-over protocols, IEEE 802.1x)
- Cryptographic solutions (including common stand-ards and ciphers, symmetric and asymmetric en-cryption, PKI, HSM, smartcards)
- Security protocols (including SSL/TLS, IPsec, VPN)
- Ability to write comprehensive documentation.
- Hardening/Securing of Windows Servers and Desk-tops
- Hardening/Securing of Unix-like systems (such as System V, Linux, BSD)
- VMWare VSPHERE and ESXi technologies
- Windows Operating systems
- Linux Servers (Redhat, DEBIAN)
- NetAPP Storage NAS/SAN
- Firewalls
- System monitoring solutions (Nagios, Centron)
At least 1 certification among:
GSEC (GIAC Certified Security Essentials)
GCWN (GIAC Certified Windows Security
Administrator)
GCED (GIAC Certified Enterprise Defender)
GCUX (GIAC Certified UNIX Security Administrator)
ENSA (EC-Council Certified Network Administrator)
Microsoft Certified System Center Configuration Manager
MCSA (Microsoft Certified Solutions Associate) or an equivalent certification recognized internationally (subject to acceptance as a valid credential by the Contracting EU-I)
At least 1 certification among:
GCIH (GIAC Certified Incident Handler)
EC-Council Certified Disaster Recovery Professional
MCSE (Microsoft Certified Solutions Expert or an equiva-lent certification recognize internationally (subject to ac-ceptance as a valid credential by the Contracting EU-I)
The following documents / procedures will be requested to successfully complete the hiring process :
- A copy of your university degree(s)
- A copy of your criminal record
- Security Clearance Procedure
WHO WE ARE?
CRI company part of VASS Group, leads the digital transformation and cyber security in the European Union.
CRI operates serving the European Union Institutions, telecom operators, financial institutions and governmental bodies through a comprehensive offering of services and technologies.
Please visit our website and let's get in touch: www.cri-group.eu
Tags: BSD Clearance Cryptography Debian DNS Firewalls GCED GCIH GIAC GSEC IAM Intrusion detection ISO 27000 ITIL Linux Monitoring Nagios Network security PKI Security analysis Security Clearance SIEM SMTP TLS UNIX VMware VPN Windows
Perks/benefits: Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Senior Security Analyst jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Architect jobs
- Open Information Security Specialist jobs
- Open Staff Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Cyber Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Product Security Engineer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Chief Information Security Officer jobs
- Open Senior Information Security Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open IT Security Analyst jobs
- Open Security Specialist jobs
- Open Cybersecurity Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Senior Security Architect jobs
- Open Sr. Security Engineer jobs
- Open Security Operations Analyst jobs
- Open Application security-related jobs
- Open ISO 27001-related jobs
- Open Clearance-related jobs
- Open Network security-related jobs
- Open Windows-related jobs
- Open Agile-related jobs
- Open Pentesting-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open Analytics-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open DevOps-related jobs
- Open Kubernetes-related jobs
- Open Malware-related jobs
- Open CI/CD-related jobs
- Open IDS-related jobs
- Open Security Clearance-related jobs
- Open EDR-related jobs
- Open DevSecOps-related jobs