What skills does an IT security manager need?
At HostJane, we strive to attract AWS Certified Security specialoists with, OSCP, Security+, CISSP or other Security certifications who have Cloud Cyber Security experience in AWS to identify bad actors and work to create steps to defend against security threats. Generally, the good IT security manager has broad hands-on knowledge of firewalls, intrusion detection/prevention systems, anti-virus software, data encryption, and a full understanding of common protocols such as TCP, UDP, IPSec, HTTP, SSL, TLS and DNS as well as how to perform Vulnerability Scans across all network segments and Web Services.
What experience should I look for when hiring cyber security freelancers?
The security freelancer should have knowledge of PSPF, ISM, ISMS, NIST, ISO2700, HIPAA frameworks and a good understanding of IP, TCP/IP, and other network administration protocols, including configuring and optimizing Microsoft Sentinel. She or he should have a ready CV that shows they are familiar with both wired and wireless networking and centralized authentication systems (Active Directory, Open Directory). This should be in combination with recent work undertaking security of operating systems (Windows client and server, OS X, iOS, Android and Linux), VMware, Hyper-V, server hardware, Active Directory, Azure AD, MS Exchange Online, Endpoint Manager, PowerShell, End-Point Imaging, and to be able to maintain SOE.
What kind of responsibilities does IT security roles have?
The Information Technology Security Manager (ITSM) goes far beyond a working knowledge of corporate Anti-virus products (for example Symantec Endpoint Protection, Bitdefender, Norton, McAfee, Kaspersky, Webroot, Trend Micro, Windows Defender etc.) The ITSM, in MS systems, will perform Microsoft Active Directory administration tasks, including user/group management, account creation, security permissions and group policies. With Linux systems be responsible for linux security administration on CLI and account management; Analysis of system and security event logs and performing vulnerability scans. More generally, to report security deficits/vulnerabilities. Across all systems, be a first line responder to security incident reporting and analysis; perform secure data control operations; provide documentation and technical specifications for planning and implementing new or upgrades of IT infrastructure. This ITSM role will maintain security on infrastructure including, laptop & desktop computers, servers, routers, switches, firewalls, printers, security updates, LANs, and network segments; digitally sanitize computer hardware and network devices in accordance with ISM requirements; Audit IT hardware, Network Equipment and cabling as well as update and maintain security applications and license management.