What are the responsibilities and job description for the Mid-level PKI Engineer position at ProTek Consulting?
Job Description
This is a fully remote role requiring 3-5 years of PKI experience.
This position is for an Associate PKI Engineer who will assist with implementing PKI architectures. Maintains, documents, and supports Public Key Infrastructure (PKI), Key Management Systems (KMS) and Hardware Security Modules (HSM).
Essential Functions
PROTEK Consulting is a Woman-Owned Small Business led by an experienced team of industry veterans. Together, we make impeccable candidate-to-job matches delivering the right fit for our clients, every time. We work tirelessly in pursuit of the perfect match for our clients, with the ultimate goal of becoming one of their strategic business partners. We value and strive for a long-term relationship not short-term gain. We put our client’s interest in front of our own. We work really hard to understand our client’s underlying interests not just surface “wants”. We are genuinely passionate and enthusiastic about connecting our clients with the perfect match.
PROTEK Consulting is a Woman-Owned Small Business led by an experienced team of industry veterans. Together, we make impeccable candidate-to-job matches delivering the right fit for our clients, every time. We work tirelessly in pursuit of the perfect match for our clients, with the ultimate goal of becoming one of their strategic business partners. We value and strive for a long-term relationship not short-term gain. We put our client’s interest in front of our own. We work really hard to understand our client’s underlying interests not just surface “wants”. We are genuinely passionate and enthusiastic about connecting our clients with the perfect match.
This is a fully remote role requiring 3-5 years of PKI experience.
This position is for an Associate PKI Engineer who will assist with implementing PKI architectures. Maintains, documents, and supports Public Key Infrastructure (PKI), Key Management Systems (KMS) and Hardware Security Modules (HSM).
Essential Functions
- Perform supervised maintenance and support of Public Key Infrastructure (PKI) operations
- Assist in administration of Certification Authority (CA) certificate lifecycle for various applications and solutions
- Participate in projects to deploy new PKI applications and services
- Assist in proactive monitoring, alerting, trend analysis for PKI and underlying infrastructure, and support the operations team in implementation
- Assist senior members to facilitate certificate requests
- Understand the improvements and changes senior members make to PKI operations in accordance with standard procedures and change control policies and procedures
- Work with senior members to evaluate upgrades and new products & technologies for the enterprise PKI infrastructure
- Understand process improvements to reduce risk and improve operational efficiency
- Review design, installation, and operations & maintenance guides
- Support HSM lifecycle management requests, resolve problem tickets and assist other staff members as needed
- Support end-to-end symmetric key management
- Assist in data encryption deployments
- Assist with CA certificate lifecycle, resolve problem tickets, and assist other staff members as needed
- Understand a Certificate Practice Statement (CPS), including areas of design, deployment, validation, operational and Disaster Recovery/Business Continuity Planning (DR/BCP) with assistance from senior members
- Travel 4 times a year domestically
- 3-5 years of work experience in Information Security and/or related IT operational functions, with a bachelor's degree or an advanced degree
- Basic understanding of PKI policies and procedures (RFC5280, RFC3647, ITU-T X.509, ISO21188, etc.).
- Basic understanding of PKI components; Certification Authorities, Registration Authority, CRLs, OCSP, and Certificates.
- Knowledge of Public Key Infrastructure (PKI) to include standards and architectures, with PKI certification authority administration experience.
- Familiar with the following Internet protocols which includes, but not limited to TCP/IP, TLS, DNS, IPsec, OCSP, SCEP, and LDAP.
- DoD 8570.01 IAT II (One of the following or higher (CySA , GICSP, GSEC, Security CE, CND, SSCP) and other comparative information security certifications are preferred
- Experience with the following IT Infrastructure: Systems Administration, Network Administration Windows/Linux OS, Network Administration, Active Directory and/or Virtualization.
- Be familiar with Industry standards as applied to asymmetric and symmetric key usage.
- Must be able to manage multiple tasks and priorities to meet deadlines.
PROTEK Consulting is a Woman-Owned Small Business led by an experienced team of industry veterans. Together, we make impeccable candidate-to-job matches delivering the right fit for our clients, every time. We work tirelessly in pursuit of the perfect match for our clients, with the ultimate goal of becoming one of their strategic business partners. We value and strive for a long-term relationship not short-term gain. We put our client’s interest in front of our own. We work really hard to understand our client’s underlying interests not just surface “wants”. We are genuinely passionate and enthusiastic about connecting our clients with the perfect match.
PROTEK Consulting is a Woman-Owned Small Business led by an experienced team of industry veterans. Together, we make impeccable candidate-to-job matches delivering the right fit for our clients, every time. We work tirelessly in pursuit of the perfect match for our clients, with the ultimate goal of becoming one of their strategic business partners. We value and strive for a long-term relationship not short-term gain. We put our client’s interest in front of our own. We work really hard to understand our client’s underlying interests not just surface “wants”. We are genuinely passionate and enthusiastic about connecting our clients with the perfect match.