We recognize our competitive advantage our people. We believe in our people, who share our vision of meeting the needs of our employees, customers, and communities and who carry out the continued success of the company.
Our employees are committed to the company's foundational values : integrity, excellence, teamwork, environmental stewardship, and community commitment.
In turn, we invest in our employees, providing opportunities for challenge and advancement and offering a competitive compensation package.
Posting End Date : at 11 : 59PM HST
BRIEF POSTING DESCRIPTION :
The P EJ INFORMATION ASSURANCE Department of the P INFORMATION ASSURANCE Division at Hawaiian Electric Company has 3 Management vacancies available. (Role : )
JOB FUNCTION (Security Architecture) :
Performs assessments of systems and networks within the network environment or enclave and identifies where those systems / networks deviate from acceptable configurations, policies, or guidance.
Measures effectiveness of defense-in-depth architecture against known vulnerabilities.
- Assists with risk assessments, and development of security architecture solutions for information technology (IT), operational technology (OT), grid technologies and cloud services.
- Supports development of detailed plans and requirements for information systems’ security controls and security monitoring solutions.
- Conducts ongoing compliance reviews; assists in developing practices to ensure adequate information security and IT controls.
JOB FUNCTION (c) :
Performs vulnerability assessments of systems and networks within the network environment or enclave and identifies where those systems / networks deviate from acceptable configurations, policies, or guidance.
Measures effectiveness of defense-in-depth architecture against known vulnerabilities.
- Assists with risk assessments, and development of security architecture solutions and technologies.
- Supports development of detailed proposals and plans for new information security systems and controls to enhance or enable new capabilities for network or hosted applications.
- Conducts ongoing compliance reviews; assists in developing practices to ensure adequate information security and IT controls.
ESSENTIAL FUNCTIONS :
- Performs information security risk assessments and recommends mitigating controls and solutions for IT and Operations Technology (OT) projects and applications, including proposals for externally hosted applications and new utility technology projects.
- Assists with the system assessments for conformance with configuration control, policy, and guidance.
- Assists with program development and management for privacy, e-discovery, security awareness training, digital forensics, vulnerability remediation, and other security and compliance programs.
- Performs miscellaneous administrative roles such as schedule development, information tracking, updating deliverables and other work assigned.
- Supports the Company’s business continuity planning, IT disaster recovery planning, cybersecurity incident response planning and team (CS-IMT), with occasional on-call support.
- Participates in Company emergency response activities as assigned, including any activities required to prepare for such emergency response.
BASIC QUALIFICATIONS :
Knowledge Requirements
- Computer networking concepts and protocols, and network security methodologies.
- Risk management processes (e.g., methods for assessing and mitigating risk).
- Cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
- Laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
- Cyber threats and vulnerabilities.
- Cryptography and cryptographic key management concepts.
- Data backup and recovery concepts.
- Host / network access control mechanisms (e.g., access control list, capabilities list).
- Network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
- Traffic flows across the network (e.g., Transmission Control Protocol TCP and Internet Protocol IP , Open System Interconnection Model OSI , Information Technology Infrastructure Library, current version ITIL ).
- Programming language structures and logic.
- System and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language / Structured Query Language PL / SQL and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
- Network attacks and a network attack’s relationship to both threats and vulnerabilities.
- System administration, network, and operating system hardening techniques.
- Different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
- Different cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).
- Different cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.).
- Network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
- Specific operational impacts of cybersecurity lapses.
- Security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
- Ethical hacking principles and techniques.
- Penetration testing principles, tools, and techniques.
Skills Requirements
- Conducting vulnerability scans and recognizing vulnerabilities in security systems.
- Assessing the robustness of security systems and designs.
- Detecting host and network-based intrusions via intrusion detection technologies (e.g., Snort).
- Mimicking threat behaviors.
- Use of penetration testing tools and techniques.
- Use of social engineering techniques (e.g., phishing, baiting, tailgating, etc.).
- Use of network analysis tools to identify vulnerabilities (e.g., fuzzing, nmap, etc.).
- Reviewing logs to identify evidence of past intrusions.
- Conducting application vulnerability assessments.
- Performing impact / risk assessments.
- Developing insights about the context of an organization’s threat environment.
- Collaborating with teammates and other employees.
- Communicating effectively in writing and verbally.
Experience Requirements
Entry Level :
- 1-3 years of experience in Systems administration, basic cyber analysis / operations, cyber threats, risk management, network management, IT system design, cloud deployment or wireless networking.
- Associates Degree or equivalent work experience in Computer science, cybersecurity, information technology, software engineering, information systems, computer engineering.
- Obtain within the first six month of employment one or more of the following Certifications A+ CE, CCNA-Security, CND, Network+ CE, SSCP, CCNA Security, CySA+ (CSA+), GICSP, GSEC, Security+ CE, CND, SSCP (Other certification will be considered).
Intermediate Level :
4-7) years of experience information assurance, incident handling, risk management, vulnerability management and analysis, and assistance programs.
- Bachelor’s degree (or higher) in computer science, cybersecurity, information technology, software engineering, information systems, computer engineering.
- One or more of the following Certifications A+ CE, CCNA-Security, CND, Network+ CE, SSCP, CCNA Security, CySA+ (CSA+), GICSP, GSEC, Security+ CE, CND, SSCP (Other certification will be considered).
Role :
Number of Vacancies : 3
Work Schedule : Monday - Friday
Work Hours : 7 : 30 am - 4 : 00 pm