Home Information Security Engineer
 

Keywords :   


Information Security Engineer

2018-04-05 15:25:03| Space-careers.com Jobs RSS

ACS has almost 40 years of experience in delivering Ground Segment solutions for Earth Observation satellites since 1979. A long record of successful projects carried out for Space Agencies and Research Centres ESA, INPE, ASI, EUMETSAT, EMSA is the greatest testimony to our work. The company based in Rome Italy and Darmstadt Germany has been delivering these EO systems worldwide. The latest? In December 2017, ACS signed the contract with EUMETSAT for realization of the Sentinel6JasonCS Payload Data Acquisition and Processing System. ACS can offer competitive remuneration as part of a permanent, fulltime employment contract attractive benefit package tailored on specific exigencies stimulating, international working environment at customer site training and personal growth within ACS Exprivia international group TASKS Security Monitoring and Analytics SIEM technologys SPLUNK syslog Security Awareness Develop and deliver security awareness and compliance training programs Conduct knowledge transfer training sessions to security operations team upon technology implementation. Forensics Analysis Utilize investigative methods, forensic software and hardware to locate specific electronic data including internal and external email Internet history usage documents, malware and other files to support ESACERT Service manager. Vulnerability Management Utilize standard vulnerability tools like Nessus, Acunetix , OpenVas Security Intelligence Integration within existing tool of Security Intelligence services Knowledge of OSINT tools MISP Incident Response Incident Handling Reporting Vulnerability Scanning SIEM Log Analysis Firewall Analysis Malware and APT ICT Infrastructure management Maintaining CERT technical environment infrastructure Servers, Appliances, VMs and workstations used for the daily security activities Analysis of ESA environment softwarehardware against security risks Security White Papers NON TECHNICAL REQUIREMENTS Considering the nature of the service privacy and nonconflicts of interest are essential requirements to be able to deliver the service The staff shall be ready to apply, upon ESA request, for national security clearance. The staff shall not respond to or be employed by a company that plays major roles in the delivery of ITTechnical services to ESA. 4 ZED! SUPPORT TO DIRECTORATES Zed! Is a software solution from Primex technology that has been selected as EU dual approved encryption technology suitable for ESA classified documents up to Restricted. Zed! Uses encrypted containers to protect file transports regardless of the method used email attachment, USB stick, removable device, file transfer, etc. Support need to be provided to endusers all over the Agency for ZED! Secure software installation, configuration and disposal in according to existing procedures on supported platform Windows, VDIMAC Preparation and maintenance of ZED! Guideline for secure utilization of the software within the ESA environment. Troubleshooting and support user request who has issues with the software. Incident Management REQUIREMENTS General University degree in relevant disciplines EU national or valid work permit for Germany CV in Europass format Required BASIC skills Good knowledge of Networking and TCPIP protocols, Operating Systems UnixLinux, Windows XP720082012, VMWare Programming Languages C, C at least one Scripting Languages PHP, Python, Perl at least one Knowledge of Firewall, IDSIPS, proxies and VPN Gateways Required ADVANCED skills Experience in CERT or SOC Blue team SIEM, Investigation skills on centralized log management systems Penetration test and Vulnerability Assessment Red team Malware analysis static and dynamic with knowledge on Sandbox devices. Strong experience in Encryption technology and tools e.g. ZED!, PGP,PKI Other skills Project Management Good interpersonal and diplomatic skills and team player Fluent in English speaking and writing e.g. B2 Writing User Manuals Writing and managing Project and Service Documentation Working knowledge of data protection based on a defenseindepth approach Working knowledge of the ITIL and the ISO27000 Framework Knowledge of the EU Data Classification model is an asset Willing to travel for user community related requirements and issues. Professional Certifications related Security skills are considered an asset ECCouncil, httpwww.eccouncil.org Certified Ethical Hacker GIAC, httpwww.giac.org Certified Incident handler, Certified penetration tester, Certified Forensic analyst Offensive Security, httpwww.offensivesecurity.com

Tags: information security engineer information security

Category:Transportation and Logistics

Latest from this category

All news

24.04Atlantic Tropical Weather Outlook
Transportation and Logistics »
25.04Meta shares sink after it reveals spending plans
25.04How fraudsters are getting fake articles onto Facebook
25.04US TikTok ban would be 'devastating', UK firms warn
25.04Labour pledges to renationalise most rail services within first term
24.04Inter Parfums, Inc: Q1 2024 Results
24.04Gillette Venus Partners with Swimwear Brand The Saltwater Collective
24.04Womens Personal Care Brand WooWoo Expands into Bluemercury
24.04Monat Global Initiates Growth Alliance with Thought Leader Eric Worre
More »