Computer Security Specialist Job Description

Computer Security Specialist Job Description

4.5
180 votes for Computer Security Specialist
Computer security specialist provides LCS STIG, Cybersecurity Risk Management Framework, and Information Assurance Certification and Accreditation support necessary to satisfy DoD cybersecurity requirements.

Computer Security Specialist Duties & Responsibilities

To write an effective computer security specialist job description, begin by listing detailed duties, responsibilities and expectations. We have included computer security specialist job description templates that you can modify and use.

Sample responsibilities for this position include:

Develop deep knowledge and methodology of Windows, MacOS and Cloud forensics
Analyse security alerts and provide expertise on Windows and MacOS security incidents
Provides monitoring and analysis on the output of security devices, including logs, application output, and providing reporting to all levels within the command on risk identification and assessment
Establish, configure and maintain both the internal/trusted network and service network security standards and polices
Conduct training requirements analyses
Interact with government engineers and technical support personnel
Prepare briefing presentations
Review/develop/update Navy Training System Plans (NTSPs)
Perform Job Task Analyses (JTAs) and other training Front-End Analyses (FEAs)
Review/develop/update Navy training curricula

Computer Security Specialist Qualifications

Qualifications for a job description may include education, certification, and experience.

Licensing or Certifications for Computer Security Specialist

List any licenses or certifications required by the position: II, IAT, CISSP, CE, CSA, SSCP, GSEC, GICSP, CCNA, IA

Education for Computer Security Specialist

Typically a job would require a certain level of education.

Employers hiring for the computer security specialist job most commonly would prefer for their future employee to have a relevant degree such as Bachelor's and Associate Degree in Computer Science, Engineering, Education, Information Security, Information Technology, Technical, Science, Mathematics, Arts, Business/Administration

Skills for Computer Security Specialist

Desired skills for computer security specialist include:

Deployment methodologies and tooling
Linux
Oracle
VMWare
Windows
Multiple database architectures: Cisco
Ability to provide Information Security and Information Assurance solutions centered around cloud solutions
DoD Risk Management Framework
DoD networks
Implementation and security levels and roles necessary for successful deployment

Desired experience for computer security specialist includes:

Classroom instructor experience, preferably at a Center for Information Dominance Learning Site
Candidate must have taken either the 4-day classroom ACAS Operator course or the 32-hour online FedVTE version of the course and passed the exam
Possess above average knowledge and understanding of Host-based Security System (HBSS) and a thorough knowledge of the DISA FSO Security Readiness Review (SRR) Process
Develops course curriculum for information security training and provides on-site instruction and review
Bachelor’s Degree in Information Technology or associated discipline preferred and a minimum of 5 years of applicable experience
BA or BS degree in Computer Science, Information Technology, or a related field

Computer Security Specialist Examples

1

Computer Security Specialist Job Description

Job Description Example
Our growing company is hiring for a computer security specialist. Thank you in advance for taking a look at the list of responsibilities and qualifications. We look forward to reviewing your resume.
Responsibilities for computer security specialist
  • Update information in DoD and Army using compliance tools and providing an updated report on status of all systems that do not meet compliance
  • Provide feedback on Information Assurance Vulnerability Management (IAVM) to Systems Chief regarding IA policies and procedures
  • Research Army and Policy documents and providing guidance to system owner, to include documenting any changes to policies and procedures
  • Provide automated scan information using approved DoD tools to check the security posture of assets
  • Review System Plan of Action and Milestones (POAMs) to ensure proposed solutions from system integrators are appropriate and address vulnerabilities and providing updates on the POAMs
  • Oversee and monitor Risk Management Framework (RMF) policies and procedures with expert knowledge in the Enterprise Mission Assurance Support Service (eMass)
  • Work closely with the Command Cyber Security Office to ensure that all Systems security requirements are compliant
  • Provide expert knowledge and oversight for Cyber Security Inspection Audits and in the Ports, Protocols & Management Systems (PPMS)
  • Assist with SACO tasking and oversight to System Whitelist in Army Registry of Networks and Layer-3 Devices (ARNLD)
  • Monitor various security tools to identify potential incidents, network intrusions, and malware events
Qualifications for computer security specialist
  • Eight (8) years of Systems Engineering Management and C4I Systems-of-Systems design and integration experience
  • Bachelor’s Degree from an accredited college or university in Computer Science required
  • Must be familiar with standard concepts, practices, and procedures within Computer Security Systems
  • Bachelor’s Degree from an accredited college or university in Computer Science or related field of study required
  • Must have experience performing risk analyses and mitigating findings
  • Must have knowledge of FISMA, NIST, HHS, and OMB guidelines
2

Computer Security Specialist Job Description

Job Description Example
Our company is searching for experienced candidates for the position of computer security specialist. If you are looking for an exciting place to work, please take a look at the list of qualifications below.
Responsibilities for computer security specialist
  • Generate trouble tickets and performing initial validation and triage to determine whether incidents are security events
  • Follow established incident response procedures to ensure proper escalation, analysis and resolution of security incidents
  • Analyze and correlate incident event data to develop preliminary root cause and corresponding remediation strategy
  • Provide technical support for new detection capabilities, recommendations to improve upon existing tools/capabilities
  • Perform host and cloud forensics investigations across Asian countries using Forensics methodology and recording chain of custody for legal purposes
  • Respond to security incidents and write reports
  • Train teams for the first level of digital investigation
  • Write documentations and SoPs
  • Developing tools
  • GCFA, GCWN, GCIH, OSCP, OSCE, OSWE, GCIA, GMON, GREM, GSE
Qualifications for computer security specialist
  • CISSP Certification or Level III equivalent
  • Certified on CISSP, Security + and Network +
  • Experience working with Government personnel to secure accreditation approval of major systems installations specifically RF-ITV and TC-AIMS II
  • Expert knowledge in the Enterprise Mission Assurance Support Service (eMass)
  • Two years supporting DoD Command and Control Information Technology systems (with preference for experience with Chemical, Biological, Radiological and Nuclear (CBRN) Information Technology programs
  • Seven years of experience in the Information Technology field
3

Computer Security Specialist Job Description

Job Description Example
Our company is growing rapidly and is looking to fill the role of computer security specialist. If you are looking for an exciting place to work, please take a look at the list of qualifications below.
Responsibilities for computer security specialist
  • Ensures appropriate processes are in place and followed so that systems are compliant with applicable policies, procedures, contracts and regulatory requirements by monitoring, assessing and implementing security procedures
  • Analyzes security events and records to determine if security incidents have occurred
  • Provides consultation and advice on security issues
  • Participates in and/or leads incident response teams, and can work independently
  • Defines, develops and deploys IT processes and computing standards using process management methods
  • Develops policies and provides oversight for computing and information security driven by regulation, law or contracts
  • Collects, preserves and documents information to assist in investigations in order to determine facts, establishes non-repudiation and, when directed, preserves the chain of custody
  • Participates in and/or leads the development of training materials and processes regarding computing and information security
  • Designs, tests and deploys network security solutions and components by ensuring security requirements are implemented
  • Integrate monitoring of systems for security issues, including the review of continuous diagnostic and monitoring information received from various tools
Qualifications for computer security specialist
  • Available for travelling among South East Asia countries in order to perform digital forensics investigations (20% max)
  • Available for working on-call and on occasion overtime
  • Degree in Computer Science or equivalent practical experience
  • Degree in Digital Forensics
  • Good knowledge of Cloud Infrastructure and security services
  • Good knowledge of mobile forensics
4

Computer Security Specialist Job Description

Job Description Example
Our company is searching for experienced candidates for the position of computer security specialist. To join our growing team, please review the list of responsibilities and qualifications.
Responsibilities for computer security specialist
  • Conduct meetings to report on development status, configuration changes, risks, issues, security mitigation, security assessments, privacy assessments, lessons learned, and any potential new work identified
  • Evaluate IT security of new products and applications that are proposed or selected for the environment - advising on risk, policy and compliance issues
  • View, assess, and report on the adherence of systems and other products developed and operated against accessibility, usability, security, privacy, and functionality requirements and controls
  • Mitigate and remediate accessibility, usability, security, privacy, and functionality weakness and vulnerabilities
  • Assist the CISO in reviewing documentation required for Authority to Operate Certifications
  • Support agency reporting and submission of security documents and reports through respective systems
  • Provide support for the development and maintenance of system security and privacy documentation
  • Develop and maintain a template library of checklists, sample documents, and reports on security compliance
  • Develop secure systems that are accessible and comply with Section 508 requirement
  • Administering the Coalition Electronic Key Management (CEKMS) and Regional COMSEC Account
Qualifications for computer security specialist
  • Good knowledge of Active Directory security
  • Experienced with remote forensics tools such as OSquery, GRR Rapid Response, etc
  • Mandarin working proficiency (talk, read)
  • Experience with DoD Cybersecurity policies and procedures
  • Experience with analyzing security policies
  • Bachelor of Science degree in Information Technology, IT Security, Network Systems Technology or related field
5

Computer Security Specialist Job Description

Job Description Example
Our growing company is looking for a computer security specialist. Please review the list of responsibilities and qualifications. While this is our ideal list, we will consider candidates that do not necessarily have all of the qualifications, but have sufficient experience and talent.
Responsibilities for computer security specialist
  • Documenting quarterly inventories and inspections of all stored COMSEC equipment, KEYMAT documents, and materials using the NSA Central Office of Record (COR) website
  • Performing routine destruction of COMSEC materials when required by NSA COR keying material Controlling Authority (CONAUTH)
  • Conducting semiannual inventories by sighting all COMSEC material charged to the account, and reconcile inventory with the Central Office of Record (COR)
  • Develop Standard Operating Procedures (SOPs) for all issues concerning COMSEC equipment, KEYMAT, and associated information from coalition countries
  • Provide the technical assistant with monthly status reports to include lists of accomplishments and any task issues/problem areas requiring government action
  • Provide analysis of cloud cybersecurity architecture, compliance with Federal regulation and policy, and commercial best practices relating to cloud security
  • Review, analyze, discuss, and evaluate the implementation of security controls in multiple information system environments, including dynamic cloud services (IaaS, PaaS, and SaaS)
  • Evaluate the performance of ongoing security maintenance, for example, continuous monitoring (ConMon) or continuous diagnostics and mitigation (CDM)
  • Assess the ability of the service provider to maintain an acceptable security posture/ risk threshold on a monthly basis
  • Analyze risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and cyber protection (security architecture) requirements as they relate to the ongoing security risk posture of the system
Qualifications for computer security specialist
  • 5+ years of experience with Cybersecurity, information assurance, or security practice
  • Experience with RMF, ICD 503, NIST 800–53, or NIST 800–82 documentation for system accreditations
  • BA or BS degree in Engineering, Science, or Systems Management
  • Experience with advanced cyber security tools, network topologies, intrusion detection, PKI, and secured networks
  • PII security
  • Applies extensive job practices, techniques, standards, principles, theories, and concepts

Related Job Descriptions

Resume Builder

Create a Resume in Minutes with Professional Resume Templates