Position Summary / Responsibilities
Designs, tests, and implements state-of-the-art secure operating systems, networks, and database products. Conducts risk assessment and provides recommendations for application design. Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access. Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research. May prepare security reports to regulatory agencies.
Knowledge, Skills and Ability
Complete understanding and wide application of technical principle, theories, and concepts in the field. General knowledge of other related disciplines.
Provide technical solutions to a wide range of complex difficult problems. Solutions are imaginative, thorough, practicable, and consistent with organization objectives.
Works under only general direction. Independently determines and develops approach to solutions. Work is reviewed upon completion for adequacy in meeting objectives.
Contributes to the completion of specific programs and projects. Failure to obtain results or erroneous decisions or recommendations would typically result in serious program delays and considerable expenditure of resources.
Frequent inter-organizational and outside customer contacts. Represents the organization in providing solutions to difficult technical issues associated with specific projects.
5 Years relevant experience with Bachelors; 3 Years with Masters