IT Security Engineer¶
Security Architect < Systems Architecture < Securely Provision¶
Ensures that the stakeholder security requirements necessary to protect the organization’s mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.
Define and prioritize essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event. Document and address organization’s information security, cybersecurity architecture, and systems security engineering requirements throughout the acquisition life cycle. Employ secure configuration management processes. Ensure that acquired or developed system(s) and architecture(s) are consistent with organization’s cybersecurity architecture guidelines. Perform security reviews, identify gaps in security architecture, and develop a security risk management plan. Provide input on security requirements to be included in statements of work and other appropriate procurement documents. Document and update as necessary all definition and architecture activities. Determine the protection needs (i.e., security controls) for the information systems) and network(s) and document appropriately. Translate proposed capabilities into technical requirements. Assess and design security management functions as related to cyberspace.
Knowledge of computer networking concepts and protocols, and network security methodologies. Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. Knowledge of authentication, authorization, and access control methods. Knowledge of application vulnerabilities. Knowledge of communication methods, principles, and concepts that support the network infrastructure. Knowledge of capabilities and applications of network equipment including routers, switches, bridges, servers, transmission media, and related hardware. Knowledge of cyber defense and vulnerability assessment tools and their capabilities. Knowledge of installation, integration, and optimization of system components. Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML). Knowledge of operating systems. Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). Knowledge of the application firewall concepts and functions Knowledge of Personally Identifiable Information (PII) data security standards. Knowledge of Personal Health Information (PHI) data security standards. Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.
Skill in applying and incorporating information technologies into proposed solutions. Skill in designing countermeasures to identified security risks. Skill in designing the integration of hardware and software solutions. Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. Skill in configuring and utilizing software-based computer protection tools (e.g., software firewalls, antivirus software, anti-spyware). Skill in setting up physical or logical sub-networks that separate an internal local area network (LAN) from other untrusted networks. Skill in configuring and utilizing computer protection components (e.g., hardware firewalls, servers, routers, as appropriate). Skill to identify cybersecurity and privacy issues that stem from connections with internal and external customers and partner organizations.
Ability to communicate effectively when writing. Ability to conduct vulnerability scans and recognize vulnerabilities in security systems. Ability to apply an organization’s goals and objectives to develop and maintain architecture. Ability to optimize systems to meet enterprise performance requirements. Ability to apply network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). Ability to apply secure system design tools, methods and techniques. Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations. Ability to set up a physical or logical sub-networks that separates an internal local area network (LAN) from other untrusted networks.