Position Title: Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Linux Administrator
Position Id:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â 6406-1
Duration:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â 5 Months
Work Location:Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â COLUMBIA, SC 29210
SCOPE OF THE PROJECT:
SOC SECURITY AND LINUX SUPPORT ENGINEER
Support the Division of Information Security (DIS) Security Operations Center (SOC) daily operations with installation, configuration, administration, monitoring and troubleshooting security sensors, log sources, and supporting systems.DAILY DUTIES / RESPONSIBILITIES:
MANAGE AND ADMINISTER A LARGE NUMBER OF LINUX SERVERS AND OPEN-SOURCE SOFTWARE PACKAGES.
MANAGE OPEN-SOURCE PATCH MANAGEMENT AND STATUS MONITORING SYSTEMS.INSTALL AND CONFIGURE SECURITY SENSORS COMPRISED OF OPEN-SOURCE CENTOS LINUX PLATFORMS AS WELL AS IBM/QRADAR FLOW COLLECTOR AND EVENT COLLECTOR APPLIANCES.
WORK WITH STATE ENTITIES TO INTEGRATE NEW LOG SOURCES INTO SOC MONITORING AS WELL AS MAINATIN AND MONITOR EXISTING LOG SOURCES.
Support the Division of Information Security (DIS) Security Operations Center (SOC) daily operations with installation, configuration, administration, monitoring and troubleshooting security sensors, log sources, and supporting systems.DAILY DUTIES / RESPONSIBILITIES:
MANAGE AND ADMINISTER A LARGE NUMBER OF LINUX SERVERS AND OPEN-SOURCE SOFTWARE PACKAGES.
MANAGE OPEN-SOURCE PATCH MANAGEMENT AND STATUS MONITORING SYSTEMS.INSTALL AND CONFIGURE SECURITY SENSORS COMPRISED OF OPEN-SOURCE CENTOS LINUX PLATFORMS AS WELL AS IBM/QRADAR FLOW COLLECTOR AND EVENT COLLECTOR APPLIANCES.
WORK WITH STATE ENTITIES TO INTEGRATE NEW LOG SOURCES INTO SOC MONITORING AS WELL AS MAINATIN AND MONITOR EXISTING LOG SOURCES.
REQUIRED EDUCATION/CERTIFICATIONS:
Bachelor’s degree, or 4 years of experience in Linux system administration.
Category
|
Name
|
Last Used
|
Last Used by Candidate (Year)
|
Experience
|
Candidate Exp. (in years)
|
Network Security
|
information security principles and practices
|
Within 6 Months
|
2 – 4 Years
|
||
Network Security
|
IT Security
|
Within 6 Months
|
2 – 4 Years
|
||
Network Security
|
Security Information Event Management (SIEM) systems development / configuration
|
Within 6 Months
|
2 – 4 Years
|
||
Networking & Directories
|
Experience with UNIX, Windows, Linux, MacOS, Cisco, Juniper, web apps, databases, strong authentication, operating systems and network security protocols and procedures.
|
Currently Using
|
4 – 6 Years
|
||
Networking & Directories
|
Information Security
|
Within 6 Months
|
2 – 4 Years
|
||
Operating Systems/APIs
|
Linux
|
Currently Using
|
4 – 6 Years
|
||
Programming Languages
|
BASH SCRIPTING
|
Within 6 Months
|
2 – 4 Years
|
||
Programming Languages
|
Perl
|
Within 6 Months
|
2 – 4 Years
|
||
Programming Languages
|
Python
|
Within 6 Months
|
2 – 4 Years
|
||
Programming Languages
|
Relevant programming languages and scripting tools.
|
Within 6 Months
|
2 – 4 Years
|
||
Protocols
|
Knowledge of networking protocols, including TCP/IP, HTTP, NTP, DNS, MLLP, NDM
|
Currently Using
|
4 – 6 Years
|
||
Protocols
|
TCP/IP
|
Currently Using
|
4 – 6 Years
|
||
Specialties
|
Experience in developing and maintaining documentation for policies, procedures, and best practices
|
Within 1 Year
|
2 – 4 Years
|
REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
- Expert level ability to administer Linux and open-source systems.
- Skilled in scripting languages such as Bash, Perl or Python.
- Understanding of computer and network operating system fundamentals on diverse platforms (e.g. Unix, Linux, Windows, Mac/OS, Cisco, Juniper, etc.)
- Knowledge of network protocols and ability to perform TCP/IP packet analysis
- Excellent written and oral communication skills
PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
Cyber awareness and understanding.
Knowledge of information security topics related to computers, networks, and software
Experience with Security Information Event Management (SIEM) and Intrusion Detection Systems (IDS) configuration, tuning, and operation.
Understanding of information security event correlation.
Experience with authoring of policies, standards, or procedures.