Job Description
- Perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
- Monitor, evaluate, and maintain systems and procedures to safeguard internal information systems, network, databases, and Web-based security.
- Monitors and analyzes Intrusion Detection Systems (IDS) to identify security issues for remediation..
- Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
- Evaluates firewall change requests and assesses organizational risk.
- Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications, and operating systems.
- Assists with implementation of countermeasures or mitigating controls.
- Conducts regular audits to ensure that systems are being operated securely, and information systems security policies and procedures are being implemented
as defined in security plans.
- Develops, tests, and operates firewalls, intrusion detection systems, enterprise antivirus systems and software deployment tools.
- Safeguards the network against unauthorized infiltration, modification, destruction, or disclosure.
- Researches, evaluates, tests, and implements new security software or devices.
- Conducts investigations of information systems security violations and incidents, reporting as necessary to management.
- Implements, enforces, communicates, and develops security policies or plans for data, software applications, hardware, telecommunications, and information
systems security education / awareness programs.
Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web
integrity scans to determine compliance.
- Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information.
- Provides information assurance project management, technical security staff oversight, and development of mission-critical technical documents.
- Ensure compliance with regulations and privacy laws.
- Develops materials for computer security education / awareness programs.
- Responds to queries and requests for computer security information and reports.
- May coach and provide guidance to less-experienced professionals.
- May serve as a team or task lead.
Characteristics
- Investigates, analyzes, and responds to cyber incidents within a network environment or enclave.
- Uses data collected from a variety of cyber defense tools (, IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.
- Interprets, analyzes, and reports all events and anomalies in accordance with computer network directives, including initiating, responding, and reporting discovered events.
- Evaluates, tests, recommends, coordinates, monitors, and maintains cybersecurity policies, procedures, and systems, including access management for hardware, firmware, and software.
- Ensures that cybersecurity plans, controls, processes, standards, policies, and procedures are aligned with cybersecurity standards.
- Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security.
- Researches and evaluates new concepts and processes to improve performance.
- Analyzes cross-functional problem sets, identifies root causes and resolves issues.
- Develops techniques and procedures for conducting cybersecurity risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks.
- May coach and provide guidance to less-experienced professionals.
- May serve as a team or task lead.
Education and Experience
- High School Diploma or GED + 12 years of relevant experience
- Associates Degree + 10 years of relevant experience
- Bachelors Degree + 8 years of relevant experience
- Masters Degree + 6 years of relevant experience
- PhD + 4 years of relevant experience
- Note : Relevant professional certifications will be considered equivalent to six (6) months of relevant experience
Pay & Benefit Highlights
Compensation
- Above market fixed salary or hourly pay.
- Up to $10,000 bonus for each referral.
- Additional bonuses for exceptional performance, assisting with business development and company growth.
Health
100% paid premiums for health insurance. Choose from over 80 gold-level medical plans from Aetna, CareFirst, Kaiser and UnitedHealthcare.
Choose from PPO, EPO, POS, HMO, and HSA-compatible.
- HSA and FSA options.
- 100% paid premiums for dental insurance.
- 100% paid premiums for vision insurance.
Income Protection
- 100% paid premiums for short-term disability.
- 100% paid premiums for long-term disability.
- 100% paid premiums for accidental death & dismemberment.
- 100% paid premiums for life insurance with a $200,000 max benefit.
Retirement
- 8% company contribution to 401k with immediate vesting.
- 401k pre-tax and Roth options.
Leave
- Up to 20 days of flexible paid time off (PTO).
- 11 days of paid floating holidays.
Work-Life Balance
- Flexible work schedules including flex time and compressed work period.
- Remote work including partial or fully remote (contract and project-dependent).
View our detailed
Equal Opportunity Employer
Base-2 Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.