Computer Incidents Response Expert (Re - Advertise)

Bachelor's Degree   Kabul, Afghanistan Full Time 1249
Date Posted:Jun 9, 2018
Reference:MCIT - NIXA - 001
Closing Date:Jun 16, 2018
Work Type:Full Time
Number of Vacancies:1
Functional Area:IT
Salary Range:As per NTA salary scale policy
Years of Experience:2 Years
Contract Duration:Open Ended
Extension Possibility:No
Contract Type:Contractor
Probation Period:3 months
Required Languages:96,90,66

About Ministry of communication and IT:

based on it services and electronic government

Job Summary:

Perform IT Security Incident Response life cycle (preparation; detection and analysis, containment, eradication and recovery; post-incident activity);

Skills Required:

Not available

Provinces to travel:

Skills Description:

Hands-on experience with security tools and devices, operating systems, and/or networking devices desired

Knowledge of IT Security Standards, Control Frameworks and Risk Management techniques

Proven skills and experience in log analysis, incident investigations – including guidance for remediation.

Excellent oral and written communication skills

Excellent interpersonal and organizational skills

Effective leadership skills and experience

Duties & Responsibilities:

Perform IT Security Incident Response life cycle (preparation; detection and analysis, containment, eradication and recovery; post-incident activity);

Assesses IT risks and analyze potential mitigation strategies to reduce IT Security exposure (Use Cases, Scenarios)

Detailed analyses of various security event sources (FW, IDS, PROXY, AD etc.) Acts as the interface with other IT and business departments regarding IT security incidents

Security incidents are effectively identified, documented, and investigated.

Collaborates with and provides consulting services to clients if required

Provides advisory assessments in relation to cybersecurity breach prevention.

Conducts gap assessments and provides actionable recommendations to remediate shortcomings.

Demonstrated expert understanding of the life cycle of network threats, attacks, attack vectors, and methods of exploitation with an understanding of intrusion set tactics, techniques, and procedures.

Advanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth, and common security elements.

Demonstrated hands-on experience analyzing high volumes of logs, network data (e.g. NetFlow, Full Packet Capture), and other attack artifacts in support of incident investigations.

Experience and proficiency with any of the following: Anti-Virus, HIPS, IDS/IPS, Full Packet Capture, Host-Based Forensics, Network Forensics.

Experience with malware analysis concepts and methods.

Familiarity or experience in Cyber Kill Chain methodology.

Knowledge of Virtualization and Cloud security.

Knowledge of Linux, UNIX, Windows (including Active Directory) and other operating systems.

Must be a flexible team player, hard-working, and possess excellent communication and customer-facing skills.

Must be self-directed, able to manage solo projects or participate as part of a larger team.

Strong report writing skills and ability to explain complex security issues to customers in a formal presentation format.

Must be able to interact confidently with all levels of technical and management client teams.

Working knowledge of NIST SP 800-53A, ICD 503, FISMA, DCID 6/3, relationships between IC and DoD policies for assessment and authorization

Skill in using network analysis tools to identify vulnerabilities

Expert with Firewall Configuration and administration

Expert with Intrusion Detection Systems (IDS) configuration and administration

Skill in assessing the robustness of security systems and design

Skill in developing and apply security system access controls

Skill in assessments of industry IT operating system, software database, or hardware

Ability to prepare the various types of security related documents

Ability to conduct vulnerability scans and recognize vulnerabilities in security systems

Ability to evaluate the trustworthiness of the supplier and/or product

Ability to evaluate the adequacy of security designs

Ability to establish effective working relationships internally and externally to the client organization

Developed technical documentation and white papers

Knowledge of emerging security issues, risks, and vulnerabilities

Maintains and continuous improvement of processes, standards, policies, working methods, and tools using ITIL best practices

Job Location:

Afghanistan, Kabul


Bachelor Degree Computer Science

Experience working in a multinational organization desired

Experience with technical IT security incident response, host and network forensics, malware analysis

Certifications such as CISSP, GIAC certifications, Certified Ethical Hacker (CEH) preferred

At least 2 years working in IT Security

Job Keywords:

This job is expired