About the Role The successful applicant will join an existing Cybersecurity team as a systems administrator, with focus on network, cloud, and telecommunications security. The position consists of working closely with end users, system administrators, network engineers, and application developers to architect, adapt and implement security systems and controls. The position will be involved in providing technical support and guidance, test execution, monitoring, problem diagnostics, and cyber event management.
Physical Requirements Sedentary work; exerting up to 30 pounds of force occasionally, and/or a negligible amount of force frequently to lift, carry, push, pull, or otherwise move objects, including the human body. Sedentary work involves sitting most of the time in normal office conditions, but does involve walking or standing outside periodically for inspections, customer calls, etc. Work requires no unusual physical demands. Physical demands for a specific position within this classification may vary and / or exceed those demands described above.
Minimum Requirements ● Experience with server hardware and operating systems (Windows, Linux, and/or Unix) ● Experience with networking, including TCP/IP, DNS, DHCP, and routing ● Experience with network protocols, including HTTP, SSL, and IPSec ● Has or is working towards gaining CompTIA Network+, Security+, or other IT-related certifications ● Self-motivated with ability to lead and work independently to complete projects ● High School Diploma or Equivalent ● Valid driver's license
Preferred Requirements ● Proficiency in networking technologies, network security and network monitoring solutions ● Knowledge of IP network management, subnetting, routing, and network access control ● Security certification (GIAC, CISSP, SSCP, CCFP or others) ● 3+ years of combined experience in Information Security or related Information Technology position ● Knowledge of operating system, database, and application security configuration ● Knowledge of security systems including anti-virus and EDR applications, content filtering, network and application firewalls, authentication systems, and intrusion detection
About the Selection Process Phase 1 - Submit online application at www.kub.org Phase 2 - Experience, training, and education evaluation Phase 3 - Interview with department representatives Phase 4 - Written, performance, and behavioral exercises Phase 5 - Background investigation Phase 6 - Physical assessment and/or drug screen