Description
Infrastructure Security Architect - Remote
Intrusion Detection & Threat Deception in terms of designing operational models, processes and procedures under ITIL framework.
As indicated in the document the focus for this project is on intrusion detection systems and similar (network-related) security technologies. For methodology we are looking into ITIL related services, so knowledge of ITIL would be an asset.
Knowledge of the products in use at the client site is (Stamus Networks for IDS, Splunk for SIEM) would be useful but there is no specific need for very detailed knowledge on these products, as the project team would support the consultant.
Main Responsibilities:
- Develop the target operational model for the service based on provided concept
- Analyse the existing tools deployed and develop the operational responsibilities Matrix for each technical component
- Support in the definition of the business processes
- Draft Security Operation Procedures (SecOps) and workflows for the new service for both for the Security Operations Centre as well as the Security Engineering team
- Review existing Security Operation Procedures and workflows and adapt them to the new solution, with particular focus on incident handling procedures used by the Security Operations Centre
- Support the transition of the new technological solution to the teams in charge of daily operations (Security Engineering, Security Operations and Managed Service Providers)
- Assist in the update the System Architectural Design Document and System Technical Documentation
- Assist in the preparation of technical deliverables (documents) required for the service Go Live
- Support in the validation of the security tools deployed
- Participate in communication campaigns to technical staff and end-users
Specific Knowledge:
- Good communication and drafting skills
- Proven experience on how to design operational models, processes and procedures
- Proven experience on drafting technical documents in the area of IT security
- Knowledge in Intrusion Detection solutions
- Knowledge in Network topologies and network protocols
- Preferably knowledge in Network Threat Anomaly solutions
- Preferably knowledge in Threat Deception solutions
Please send your CV to Navaid Faiz and call to discuss further.
We are an equal opportunities employment agency and welcome applications from all suitably qualified persons regardless of their race, sex, disability, religion/belief, sexual orientation or age.
We champion difference in the world of technology recruitment and work with clients who actively wish to diversify their talent force - ALL applicants welcome to apply