What are the responsibilities and job description for the Cyber-Applications Supervisor position at Unlimited Technology, Inc.?
Come join our team! At Unlimited Technology, we are committed to our company's core values of Passion, Collaboration, Innovation and Adaptability. With offices throughout the United States, we are a premier cyber and physical security specialty contractor, and we are growing at a rapid pace. We have a wide range of talented and experienced individuals that deliver cutting edge technology solutions to meet our customers’ ever-changing needs. We secure the facilities and networks of the world’s leading brands and critical infrastructure and are recognized leaders in the physical and IT security, cyber, and managed services industries. UT offers a rewarding career, great benefits, and the chance to learn and work with ground-breaking technology and premier clients.
Cyber-Applications Supervisor Responsibilities:
Responsible for meeting with clients to determine their system needs. Oversee a secure implementation of 64 applications. Ability to work with design team to engineer complete system(s). Monitor and maintain system health which includes Database and application Servers. Test, program and troubleshoot access control and digital video systems. Follow assigned projects through to final adjustment and commissioning of installed systems. Create test plans and test systems. Install complete turnkey system (software and hardware). Customize system to tailor to customers’ business model. Work off hours to support customers and technicians globally. Troubleshoot system/network related issues over the phone with customers and vendors. Ability to train customers and technicians on respective systems. Be available for 24-hour phone support. Document and maintain system architecture and parameters specific to customer. To work in compliance with the Company’s Health and Safety standards and requirements; with the safety of self and others in mind at all time. Provide regular updates to management on cyber security application strategies, critical projects and related risks, potential policy exceptions, and other items, as applicable.
Cyber-Applications Supervisor Job Duties:
Benefits
Cyber-Applications Supervisor Responsibilities:
Responsible for meeting with clients to determine their system needs. Oversee a secure implementation of 64 applications. Ability to work with design team to engineer complete system(s). Monitor and maintain system health which includes Database and application Servers. Test, program and troubleshoot access control and digital video systems. Follow assigned projects through to final adjustment and commissioning of installed systems. Create test plans and test systems. Install complete turnkey system (software and hardware). Customize system to tailor to customers’ business model. Work off hours to support customers and technicians globally. Troubleshoot system/network related issues over the phone with customers and vendors. Ability to train customers and technicians on respective systems. Be available for 24-hour phone support. Document and maintain system architecture and parameters specific to customer. To work in compliance with the Company’s Health and Safety standards and requirements; with the safety of self and others in mind at all time. Provide regular updates to management on cyber security application strategies, critical projects and related risks, potential policy exceptions, and other items, as applicable.
Cyber-Applications Supervisor Job Duties:
- Ensure information security requirements are properly represented throughout ASD processes including risk assessments, new product evaluations, application development, testing, and ongoing operations.
- Engage, as necessary, in ASD sponsored application projects and advise on information security related matters.
- Manage the credentials, privileges and access for ASD corporate resources to ensure all information systems are functional and secure, ensuring that SLAs are met.
- Maintain IAM security policy including providing updates to CIS procedural documents to support policy.
- Represent CIS when working with BB&T business partners to understand business problems and providing solutions to those problems.
- Engage, as necessary, in ASD sponsored projects and advise on information security related matters.
- Manage the credentials, privileges and access for distributed systems to ensure all information systems are functional and secure, ensuring that SLAs are met.
- Maintain IAM security policy including providing updates to CIS procedural documents to support policy.
- Analyzes security-related technical problems and provides basic engineering and technical support in solving these problems. Effectively support the production applications within the assigned area, with a focus on quality implementations and production stability. This includes managing audit/risk profile and issues and data custodian responsibilities.
- Review technical and business processes, standards and procedures, making recommendations for continuous improvement.
- Assists in the development of testing strategies, methodologies and analyses; evaluates the adequacy and effectiveness of policies, procedures, processes, systems and internal controls; analyzes business and/or system changes to determine impact, identifies and assesses operational risk issues and assigns risk ratings consistent with established policy standards.
- Provides technical design and consulting services on (IAM) Identity and Access Management (IAM) products
- Provides customer specific though leadership and solution construction including installations of Identity and Access Management (IAM) products for User life-cycle management, Identity and Access Governance, Automated Provisioning, (SSO) Single Sign-On, Federation, and Privileged Account Management
- Enhances existing systems by analyzing business objectives, preparing an action plan and identifying areas for modification and improvement
- Creates customer level documentation specific to deployment of IAM products
- Creates knowledge articles for corporate website related to IAM
- Provide regular feedback to the Professional Services Director to guide systems integration methodology and packages service development
- Bachelor’s in computer science or a related field and 5 years or more of relevant experience, A current Linux certification: Red Hat Enterprise Linux (RHEL) Operating system or Linux, Professional Institute Certification (LPIC) is preferred. A current CompTIA Security
- GIAC Security Essentials Certification (GSEC) or Systems Security Certified Practitioner (SSCP) is required or must be obtained and maintained while in this role.
- Extensive knowledge of implementing and supporting Red Hat or similar branch of Linux.
- Experienced in supporting Linux in a Virtual Desktop Infrastructure.
- In-depth knowledge of Windows 10 and Windows Server 2016 or 2012R2
- Experience with administering LogRhythm
- Experienced in optimizing Linux systems for optimal performance
- Experience with writing and implementing PowerShell scripts,
- Ability to work independently on problems and projects; and participate as part of a team.
- Experienced in implementing DISA Security Technical Implementation Guidelines.
- Experienced in managing Security Vulnerability issues, remediation, and reporting.
Benefits
- Health, dental, and vision coverage
- Life insurance
- 401 (k) w/company match 100% up to 3% and an additional 50% match of 2%
- Paid time off
- 11 Paid Holidays
Salary : $80,000 - $106,000