Home information security
 

Keywords :   


Tag: information security

Information Security Advisor Freelance

2018-06-04 11:26:38| Space-careers.com Jobs RSS

Position Reference 065 For our international client, we are looking for an experienced information security professional with expertise in the field of ITINFOSEC. Tasks and Activities The scope of work will include Collaborate in the creation and validation of incident handling procedures for nominal and crisis scenarios Support to security monitoring related activities as well as investigations Resolve security incidents requesting collective decisions Provide the operational link between our client and is subcontractors Provide authorisations changes in their electronic security environment Enforce auditing responsibilities Gather exploit inputs on system and security events that are not yet accessible exploitable through IT equipment Reinforce the quality of the Security Reporting to our client by having a direct onsite access to its subcontractors inputs used for the weekly security reports Accelerate the decision process and IRC time to decision trigger points in our clients procedures for crisis scenarios Participate to cyber review board meetings and provide reports of outcome Skills and Experience The following skills and experience are mandatory You have significant demonstrable experience in a Cyber SecurityInfosec related environment You must have at least 4 years of experience in leading a team of technical experts in the field of ITINFOSEC You have practical experience in INFOSEC Security e.g. network security device administration, user security management, incident response You have experience in drafting operational procedures related to root cause investigation and troubleshooting technical issues You have a high level of proficiency in the English language at least C1 level. Knowledge in other European languages will be an asset Given the unique nature of the cyber security challenge and the urgency of this position, all applicants must already be in possession of a EUUE level security clearance How to Apply Looking to take your career to the next level? Interested applicants should submit their CV and Cover Letter to RHEAs Recruitment team at careersrheagroup.com no later than 22062018. Preference will be given to candidates eligible for an EU or national personal security clearance at the level of CONFIDENTIAL or above. About RHEA Group RHEA Group is a leading engineering consultancy firm with demonstrated expertise in space, system and secure software solutions. We attract skilled engineers, scientists and management professionals and offer a range of exciting career paths working alongside clients such as the European Space Agency, the European GNSS Agency, EUMETSAT and NATO.

Tags: information security advisor freelance

 

Information Security Consultant Cyber Internal Auditing

2018-06-04 11:26:38| Space-careers.com Jobs RSS

Position Reference 064 For our international client, we are looking for an experienced information security professional with expertise in Cyber Internal Auditing. Tasks and Activities The scope of work will include Audit processes and controls related to vulnerability management Audit implementation of operational mitigations and operational treatment plans in general Audit implementation of processes and controls related to cyber security governance Support the development of cyber audit plan Skills and Experience The following skills and experience are mandatory You have significant demonstrable experience in a Cyber Security related environment You must have at least 4 years of experience in auditing and reviewing design and implementation documentation of secure systems, with focus on implementation of security in the design and security controls e.g. patch management, hardening guidelines etc in operational ICT systems You have experience in cyber security risk management You have experience in working within complex project environments involving several stakeholders. Project experience in space programmes will be an asset You have a high level of proficiency in the English language at least C1 level. Knowledge in other European languages will be an asset Given the unique nature of the cyber security challenge and the urgency of this position, all applicants must already be in possession of a EUUE level security clearance How to Apply Looking to take your career to the next level? Interested applicants should submit their CV and Cover Letter to RHEAs Recruitment team at careersrheagroup.com no later than 22062018. About RHEA Group RHEA Group is a leading engineering consultancy firm with demonstrated expertise in space, system and secure software solutions. We attract skilled engineers, scientists and management professionals and offer a range of exciting career paths working alongside clients such as the European Space Agency, the European GNSS Agency, EUMETSAT and NATO.

Tags: information security internal consultant

 
 

Information Security Engineer

2018-04-05 15:25:03| Space-careers.com Jobs RSS

ACS has almost 40 years of experience in delivering Ground Segment solutions for Earth Observation satellites since 1979. A long record of successful projects carried out for Space Agencies and Research Centres ESA, INPE, ASI, EUMETSAT, EMSA is the greatest testimony to our work. The company based in Rome Italy and Darmstadt Germany has been delivering these EO systems worldwide. The latest? In December 2017, ACS signed the contract with EUMETSAT for realization of the Sentinel6JasonCS Payload Data Acquisition and Processing System. ACS can offer competitive remuneration as part of a permanent, fulltime employment contract attractive benefit package tailored on specific exigencies stimulating, international working environment at customer site training and personal growth within ACS Exprivia international group TASKS Security Monitoring and Analytics SIEM technologys SPLUNK syslog Security Awareness Develop and deliver security awareness and compliance training programs Conduct knowledge transfer training sessions to security operations team upon technology implementation. Forensics Analysis Utilize investigative methods, forensic software and hardware to locate specific electronic data including internal and external email Internet history usage documents, malware and other files to support ESACERT Service manager. Vulnerability Management Utilize standard vulnerability tools like Nessus, Acunetix , OpenVas Security Intelligence Integration within existing tool of Security Intelligence services Knowledge of OSINT tools MISP Incident Response Incident Handling Reporting Vulnerability Scanning SIEM Log Analysis Firewall Analysis Malware and APT ICT Infrastructure management Maintaining CERT technical environment infrastructure Servers, Appliances, VMs and workstations used for the daily security activities Analysis of ESA environment softwarehardware against security risks Security White Papers NON TECHNICAL REQUIREMENTS Considering the nature of the service privacy and nonconflicts of interest are essential requirements to be able to deliver the service The staff shall be ready to apply, upon ESA request, for national security clearance. The staff shall not respond to or be employed by a company that plays major roles in the delivery of ITTechnical services to ESA. 4 ZED! SUPPORT TO DIRECTORATES Zed! Is a software solution from Primex technology that has been selected as EU dual approved encryption technology suitable for ESA classified documents up to Restricted. Zed! Uses encrypted containers to protect file transports regardless of the method used email attachment, USB stick, removable device, file transfer, etc. Support need to be provided to endusers all over the Agency for ZED! Secure software installation, configuration and disposal in according to existing procedures on supported platform Windows, VDIMAC Preparation and maintenance of ZED! Guideline for secure utilization of the software within the ESA environment. Troubleshooting and support user request who has issues with the software. Incident Management REQUIREMENTS General University degree in relevant disciplines EU national or valid work permit for Germany CV in Europass format Required BASIC skills Good knowledge of Networking and TCPIP protocols, Operating Systems UnixLinux, Windows XP720082012, VMWare Programming Languages C, C at least one Scripting Languages PHP, Python, Perl at least one Knowledge of Firewall, IDSIPS, proxies and VPN Gateways Required ADVANCED skills Experience in CERT or SOC Blue team SIEM, Investigation skills on centralized log management systems Penetration test and Vulnerability Assessment Red team Malware analysis static and dynamic with knowledge on Sandbox devices. Strong experience in Encryption technology and tools e.g. ZED!, PGP,PKI Other skills Project Management Good interpersonal and diplomatic skills and team player Fluent in English speaking and writing e.g. B2 Writing User Manuals Writing and managing Project and Service Documentation Working knowledge of data protection based on a defenseindepth approach Working knowledge of the ITIL and the ISO27000 Framework Knowledge of the EU Data Classification model is an asset Willing to travel for user community related requirements and issues. Professional Certifications related Security skills are considered an asset ECCouncil, httpwww.eccouncil.org Certified Ethical Hacker GIAC, httpwww.giac.org Certified Incident handler, Certified penetration tester, Certified Forensic analyst Offensive Security, httpwww.offensivesecurity.com

Tags: information security engineer information security

 

Information Security Engineer

2018-04-05 13:24:36| Space-careers.com Jobs RSS

Information Security Engineer J 3130 Summary An opportunity for an experienced Information Security Engineer to work onsite at ESTEC for Telespazio VEGA UK. Objective To support the Agency constituency delivering Incident Management, Security Monitoring, Vulnerability Management and Cryptography services Responsibilities Duties Duties will include but are not limited to ESACERT Based Security Service Security Monitoring and Analytics SIEM technologys SPLUNK syslog Security Awareness Develop and deliver security awareness and compliance training programs Conduct knowledge transfer training sessions to security operations team upon technology implementation. Forensics Analysis Utilize investigative methods, forensic software and hardware to locate specific electronic data including internal and external email Internet history usage documents, malware and other files to support ESACERT Service manager. Vulnerability Management Utilize standard vulnerability tools like Nessus, Acunetix , OpenVas Security Intelligence Integration within existing tool of Security Intelligence services Knowledge of OSINT tools MISP Incident Response Incident Handling Reporting Vulnerability Scanning SIEM Log Analysis Firewall Analysis Malware and APT ICT Infrastructure management Maintaining CERT technical environment infrastructure Servers, Appliances, VMs and workstations used for the daily security activities Analysis of ESA environment softwarehardware against security risks Security White Papers NON TECHNICAL REQUIREMENTS Considering the nature of the position, privacy and nonconflicts of interest are essential requirements to be able to perform the tasks specified in Chapter 2. In particular, the personnel performing these tasks shall be ready to apply, upon ESA request, for national security clearance. shall not respond to or be employed by a company that plays major roles in the delivery of ITTechnical services to ESA. ZED! SUPPORT TO DIRECTORATES Zed! Is a software solution from Primex technology that has been selected as EU dual approved encryption technology suitable for ESA classified documents up to Restricted. Zed! Uses encrypted containers to protect file transports regardless of the method used email attachment, USB stick, removable device, file transfer, etc. Support need to be provided to endusers all over the Agency for ZED! Secure software installation, configuration and disposal in according to existing procedures on supported platform Windows, VDIMAC Preparation and maintenance of ZED! Guideline for secure utilization of the software within the ESA environment. Troubleshooting and support user request who has issues with the software. Incident Management Qualifications Experience Masters degree or equivalent qualification in Electrical Engineering, Computer Science or other relevant field. Required BASIC skills Good knowledge of Networking and TCPIP protocols, Operating Systems UnixLinux, Windows XP720082012, VMWare Programming Languages C, C at least one Scripting Languages PHP, Python, Perl at least one Knowledge of Firewall, IDSIPS, proxies and VPN Gateways Required ADVANCED skills Experience in CERT or SOC Blue team SIEM, Investigation skills on centralized log management systems Penetration test and Vulnerability Assessment Red team Malware analysis static and dynamic with knowledge on Sandbox devices. Strong experience in Encryption technology and tools e.g. ZED!, PGP,PKI Other skills Project Management Good interpersonal and diplomatic skills and team player Fluent in English speaking and writing e.g. B2 Writing User Manuals Writing and managing Project and Service Documentation Working knowledge of data protection based on a defenseindepth approach Working knowledge of the ITIL and the ISO27000 Framework Knowledge of the EU Data Classification model is an asset Willing to travel for user community related requirements and issues. Professional Certifications related Security skills are considered an asset ECCouncil, httpwww.eccouncil.org Certified Ethical Hacker GIAC, httpwww.giac.org Certified Incident handler, Certified penetration tester, Certified Forensic analyst Offensive Security, httpwww.offensivesecurity.com Further Details All roles within Telespazio VEGA have a defined closing date, however if a successful candidate is found before the advert expires the role will be closed early. We would therefore advise any candidate to apply as early as possible to avoid disappointment. Location of the position is ESTEC, Noordwijk, The Netherlands Benefits Competitive Package Security In line with Asylum Immigration Legislation, all applicants must be eligible to live and work in the EU. Documented evidence of eligibility will be required from candidates as part of the recruitment process. Furthermore, in view of the nature of the work the company is in, all potential employees will undergo stringent reference and identity checks.

Tags: information security engineer information security

 

Information Security Engineer

2018-04-03 17:25:33| Space-careers.com Jobs RSS

Serco is a specialist at delivering vital services on behalf of European, National and Local Governments. Serco Europe employs a large workforce in Belgium, Luxembourg, France, Switzerland, Germany, Holland, Spain, Italy and the UK. Our European operations have ca. 2,000 employees delivering critical services to public institutions throughout Europe. Package description Full details on application. Relocation assistance provided if applicable. Main responsibilities For our activities in ESTEC, we are currently looking for an Information Security Engineer. After an initial probation 1 monthtraining period of 23 months at ESRIN site Frascati, IT the successful candidate will be assigned to ESTEC Noordwijk, Netherland where heshe should deliver the service in scope. As team member of the ESA Computer Emergency Response Team ESACERT the ideal candidate shall support the Agency constituency delivering Incident Management, Security Monitoring, Vulnerability Management and Cryptography services. The post holder will carry out the following specific duties Security Monitoring and Analytics SIEM technologys SPLUNK Syslog. Security Awareness Develop and deliver security awareness and compliance training programs Conduct knowledge transfer training sessions to security operations team upon technology implementation. Forensics Analysis Utilize investigative methods, forensic software and hardware to locate specific electronic data including internal and external email Internet history usage documents, malware and other files to support ESACERT Service manager. Vulnerability Management Utilize standard vulnerability tools like Nessus, Acunetix, OpenVas. Security Intelligence Integration within existing tool of Security Intelligence services Knowledge of OSINT tools MISP. Incident Response Incident Handling Reporting Vulnerability Scanning SIEM Log Analysis Firewall Analysis Malware and APT. ICT Infrastructure management Maintaining CERT technical environment infrastructure Servers, Appliances, VMs and workstations used for the daily security activities. Analysis of ESA environment softwarehardware against security risks Security White Papers. Additionally, the successful post holder will provide ZED! support to directorates. Zed! Is a software solution from Primex technology that has been selected as EU dual approved encryption technology suitable for ESA classified documents up to Restricted. Zed! Uses encrypted containers to protect file transports regardless of the method used email attachment, USB stick, removable device, file transfer, etc.. Support need to be provided to endusers all over the Agency for ZED! Secure software installation, configuration and disposal in according to existing procedures on supported platform Windows, VDIMAC. Preparation and maintenance of ZED! Guideline for secure utilization of the software within the ESA environment. Troubleshooting and support user request who has issues with the software. Incident Management. Ideal candidate Considering the nature of the service privacy and nonconflicts of interest are essential requirements to be able to deliver the service specified above. In particular The staff shall be ready to apply, upon ESA request, for national security clearance. The personnel applying for the requested position should have the following skills Required BASIC skills Good knowledge of Networking and TCPIP protocols Operating Systems UnixLinux, Windows XP720082012, VMWare Programming Languages C, C at least one Scripting Languages PHP, Python, Perl at least one Knowledge of Firewall, IDSIPS, proxies and VPN Gateways. Required ADVANCED skills Experience in CERT or SOC Blue team SIEM, Investigation skills on centralized log management systems Penetration test and Vulnerability Assessment Red team Malware analysis static and dynamic with knowledge on Sandbox devices. Strong experience in Encryption technology and tools e.g. ZED!, PGP,PKI. Other skills Project Management Good interpersonal and diplomatic skills and team player Fluent in English speaking and writing Writing User Manuals Writing and managing Project and Service Documentation Working knowledge of data protection based on a defenseindepth approach Working knowledge of the ITIL and the ISO27000 Framework Knowledge of the EU Data Classification model is an asset Willing to travel for user community related requirements and issues. Professional Certifications related Security skills are considered an asset ECCouncil, httpwww.eccouncil.org Certified Ethical Hacker GIAC, httpwww.giac.org Certified Incident handler, Certified penetration tester, Certified Forensic analyst Offensive Security, httpwww.offensivesecurity.com Important Any offer of employment is contingent upon you providing documents to verify your identity and employment eligibility, as required by law. Applicants are reminded that they will be requested to produce such documentation during the recruitment process. Please contact a member of the recruitment team if you require further details of acceptable types of documentation required for verification of identity and work authorization. For positions located within the Darmstadt Support Office please note that only applicants with no family affiliation within the Company will be considered. Data Protection When creating a profile on the Serco Career Centre you agreed to the Data Protection policy, a copy is available upon request. You may submit a written request revoking your consent to this agreement at any time. About the company Serco Services GmbH, part of the Serco group, A FTSE250, Multinational Service Provider with over 50,000 employees worldwide. Sercos space heritage over the last 40 years has placed us in the Space News Top 50 Space Industry Manufacturing and Services Companies We work alongside EUMETSAT and the European Space Agency, where we are the largest onsite service provider with ca. 300 staff. What connects the ever growing Serco workforce is a passion for delivering great service To keep ahead we have to constantly evolve and enhance the way we deliver our services and everyone in Serco has a role to play here. Serco provide the right environment to encourage ideas and a comprehensive Best Practice support network that enables them to put their ideas into action. If you share our values then join with over 50,000 colleagues globally who are equally as passionate about delivering great service as you.

Tags: information security engineer information security

 

Sites : [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] next »