- Work with IT dep't to maintain cloud, windows, and other infrastructures
- Offer technical support for windows, public and private cloud-based systems and troubleshoot operational problems
- Assist in managing cloud services and Windows server environments
- Performs routine backups and archival of configuration files for disaster recovery and business continuity.
- Stays current with cloud technology developments and trends; makes recommendations to improve the college’s cloud strategy
- Works closely with the Network Manager and Information Security Officer to ensure cloud and network operations support security objectives. Ensuring high availability and disaster recovery measures are in place for all cloud-based applications and systems.
- Responsible for asset management reporting and tracking
- Procure, install, and manage software license
- Ensure network security and connectivity.
- Monitor network stability/performance (availability, utilization, throughput, and latency)
- Design and implement backup and recovery policies.
- Implements redundant and fault tolerant systems and assumes responsibility for maintaining and carrying out disaster recovery plans.
- Perform forensic investigation, analyze, respond to cyber incidents within network, application, cloud environment
- Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation
- Capable to perform real-time cyber defense incident handling (e.g forensic collection, intrusion detection and tracking, threat analysis and direct system remediation)
- Analyze digital evidence and investigate computer security incidents to derive useful information in support of system/network vulnerability mitigation
- Provide timely detection, identification and alerting of anomalous activities, misuse, activities and distinguish from benign activities
- Use data collected from different cyber defense tools 9e.g IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purpose of threat mitigation
- Collect and analyze intrusion artifacts (e.g source codes, malware and system configuration) and use discovered data to enable mitigation within the enterprise
- Perform CVE vulnerability scan/assessment
- Perform forensics from log files, memory, disk, user behavior, packet capture, data integrity
- Reconstruct timelines from chain of custody, logs
- Using SIEM, EDR and other relevant tools to detect, investigate and analyze malicious activity
- Capable to work within a security operations center (SOC) to respond to incident and recovery actions
- Provide technical directions and support to contractors and other teams
- Documenting and communicating with all internal/external stakeholders to ensure relevant data is provided for sound decision-making and situational awareness
- Understanding attack signatures, tactics, techniques, etc.
- Knowledgeable about NIST Special Publication 800-181
Additional responsibilities:
Install & Troubleshoot – Assist to install and configure the OS in cloud, SaaS (WebEx, Dropbox), IaaS (Azure) providers. Manage, update, and upgrade Operating systems. Resolve and help with system issues, update network security.
Implement & Integrate – monitor and analyze the capabilities and performance of the system, resolving service outage. Compare, evaluate, and implement new technologies on VMWare or Hyper-V before integrating them into the computing environment.
Security & Strategies – Assist with cloud server configuration, permissions, patches, troubleshooting, Azure & Windows active directory, service deployment as needed. Help maintain system security strategies, policies, and procedures using industry standards and agency methodology.
Great Expertise – working knowledge of PowerShell, Active Directory, Exchange, Office 365, Azure. Ability to assist to configure routers, firewall, switches, virtual machines, desktop and web applications.