| Clemson University|
Location Research Park/342 Computer Ct
Full/Part Time Full-Time
Implement and maintain security solutions for desktop environments that align with industry best practices ensuring a safe computing environment for university employees and students. Develop processes and procedures for university computing environments that minimize the risk of security incidents. Evaluate, install, configure, and provide maintenance of IT security related technologies.
40% - Essential - IT Security Consultant for End User Environments:
Serve as Office of Information Security and Privacy's lead analyst for endpoint security services focusing on support of various platforms, applications, and communication technologies for end user environments. Work with internal IT support groups, as well as support groups distributed throughout the university to develop and maintain processes and procedures designed to protect endpoint environments and sensitive data.
40% - Essential - Application of Security Controls:
Install and maintain security tools and processes for endpoint protection, monitoring, and remediation. Installs, configures, and maintains IT security solutions across multiple operating environments. Conducts forensic investigations of compromised systems.
15% - Essential - Security Assessments:
Assess the security posture of endpoint environments connecting to critical university systems by utilizing vulnerability assessments and penetration testing. Develop solutions, processes, and procedures to address risks identified.
5% - Essential - Professional Development:
Ensure current industry best practices are understood and applied where applicable. Pursue security certifications to enhance abilities to perform job requirements.
A bachelor's degree in information technology systems, computer science, or related field and experience in information technology systems or related area. Relevant experience may be substituted for bachelor's degree on a year-for-year basis.
Comprehensive Job Knowledge - Comprehensive knowledge of theories and practices and ability to use in complex, difficult and/or unprecedented situations
Acts as Lead - Acts as a Lead by guiding the work of others who perform essentially the same work.
No Budget Responsibilities - No fiscal responsibility for the department's budget.
- Experience working in two or more of the following: Security monitoring and intrusion detection; Network protocols and secure network design; operating system internals and hardening methods (e.g. Windows, Linux, OS X, Android); web application and browser security; security assessments and penetration testing; authentication and access control; applied cryptography and security protocols; incident response and forensics; development of security tools, automation or frameworks.
- Preferred Licenses and Certifications: Security+, GSEC, CISM, or CISSP preferred.
Standard Hrs: 37.5; Band: 08 ($ 59,161.00 - $ 109,457.00)
February 28, 2017
Clemson University is an AA/EEO employer and does not discriminate against any person or group on the basis of age, color, disability, gender, pregnancy, national origin, race, religion, sexual orientation, veteran status or genetic information. Clemson University is building a culturally diverse faculty and staff committed to working in a multicultural environment and encourages applications from minorities and women.