Job Listing Information

EDR Architect
  • 11-Jan-2022 to 25-Jan-2022 (UTC)
  • Des Moines, , IA, USA
  • Full Time
  • Long Term Contract Length
  • 40 Weekly Hours

Provide three (3) professional (REQUIRED) references on the candidate's resume with Contact Name, Title, Contact, and Relation to the candidate. NOTE: CANDIDATES WITHOUT PROFESSIONAL REFERENCES INCLUDED WILL NOT GET CONSIDERED.

Short Description:
The Technical Specialist (TS) is a senior level resource with specialized knowledge and experience in a specific technology such as SharePoint development or an SAP specialist.

Complete Description:
This position will support the State of Iowa’s Office of the Chief Information Officer (OCIO), Information Security Services (ISS) Bureau with focus on the State of Iowa’s Enterprise Endpoint Detection and Response (EDR) platform and associated services.  
EDR Architect: Provide tier 3 support and develop EDR architecture, EDR federation, and be the primary administrator for the EDR platform.
The purpose of this position is to recommend security best practices, develop EDR architecture (including federation), hardening specifications, and support the State of Iowa Endpoint Detection and Response tools across the State of Iowa. These positions will augment state staff and will be responsible for the implementation, maintenance, and continual improvement of Iowa’s EDR.
In addition, the position will require intermittent participation in incident handling processes such as incident discovery, analysis and verification, incident tracking, containment and recovery, incident response coordination, escalation, and notification.

Candidate Requirements:
- Certified Information Systems Security Professional (CISSP), Certified Information Security Auditor (CISA), GIAC Security Essentials (GSEC), or other information security certification. 
 - Must be an individual of high integrity and be a model of unwavering integrity to others. 
 - Demonstrated experience engineering and implementing an Enterprise Endpoint Detection and Response product.
- Strong understanding of security technologies and strategies, including but not limited to firewalls, IDS, policy management, security processes/best-practice, logging/monitoring, antivirus, vulnerability assessment, patch management, and incident response.
- Demonstrated ability to work effectively with customers to solve business challenges while balancing the need for confidentiality, integrity, and availability. 
 - Demonstrated commitment to fostering a diverse working environment. 
 - Strong understanding of common and emerging attack vectors, penetration methods and countermeasures. 
 - Demonstrated ability to work independently, as part of a team of peers, and to support and contribute to a multidisciplinary team environment. 
 - Solid knowledge of conflict resolution and incident escalation.
- Demonstrated ability to solve complex problems, convey both oral and written instruction, and handle multiple task interruptions while providing services in a professional and courteous manner. 
 - Proven ability to work with diverse audiences and translate technical information into non-technical information. 
 - Demonstrated ability to resolve issues in a variety of complex situations which require complex judgments and solutions based on sophisticated analytical thought.

Required / Desired Skills                
Certified Information Systems Security Professional (CISSP), Certified Information Security Auditor (CISA), GIAC Security Essentials (GSEC), or other - Required 7 Years
Must be an individual of high integrity and be a model of unwavering integrity to others. - Required 7 Years
Demonstrated experience engineering and implementing an Enterprise Endpoint Detection and Response product. - Required 7 Years
Strong understanding of security technologies and strategies, including but not limited to: firewall, IDS, policy management, security processes/best - Required 7 Years
Demonstrated ability to work effectively with customers to solve business challenges while balancing the need for confidentiality, integrity, and ava - Required  7 Years                                              
Demonstrated commitment to fostering a diverse working environment - Required 7 Years
Strong understanding of common and emerging attack vectors, penetration methods and countermeasures. - Required 7 Years
Demonstrated ability to work independently, as part of a team of peers, and also to support and contribute to a multidisciplinary team environment - Required 7 Years
Solid knowledge of conflict resolution and incident escalation - Required 7 Years
Demonstrated ability to solve complex problems, convey both oral and written instruction, and handle multiple task interruptions while providing serv - Required 7 Years
Proven ability to work with diverse audiences and translate technical information into non-technical information. - Required 7 Years
Demonstrated ability to resolve issues in a variety of complex situations which require complex judgments and solutions based on sophisticated analyt - Required 7 Years