EXPERIENCE AND EDUCATION:
Essential Qualifications/Experience:
• Bachelor's degree in Computer Science, Information Technology, or related field Or equivalent experience
• 3+ years of experience in IT security, with a focus on System Administration, Security Tools Management in large organisations
• Strong understanding of security best practices and experience with Tenable products especially with Tenable Security Center
• IP switching and routing in a wired and wireless environment
• Virtual Infrastructure management based on VMWare technologies
• Systems administration, ideally both with Windows and Linux
• Good engineering skills including programming and/or scripting knowledge (python, shell scripting, PowerShell)
• Demonstrable experience of analysing and interpreting system, security and application logs in order to diagnose faults and spot abnormal behaviours
• Comprehensive understanding of principles of Computer and Communication Security, networking, and vulnerabilities of modern operating systems and applications acquired through a blend of academic or professional training coupled with practical professional experience
Desirable Qualifications/Experience:
• Experience with threat intelligence, incident response and remediation
• Knowledge of python (pyTenable) and PowerShell. Experience working with Tenable.SC and Nessus Manager APIs
• Knowledge of NATO organization and its IT infrastructure
• Experience with Service Management, monitoring and reporting tools, ideally SolarWinds
• ITIL Service Management certifications
• Experience with system instrumentation solutions such as Ansible
• Certifications such as CISSP, CISM, or CISA
• Previous experience working for Cyber Security related organisations (CERTs, security offices)
• Previous experience working in an international environment comprising both military and civilian elements
DUTIES/ROLE:
• Monitoring and Reporting:
Proactively review logs and alerts to identify any technical issues, errors, or failures in the monitoring process
Produce and distribute reports related to system health, monitoring activities, and compliance status (e.g., audit logs, system performance metrics)
• System Documentation:
Document configuration and changes: Keep up-to-date documentation of all configurations, integration steps, troubleshooting procedures, and system maintenance tasks
Maintain an inventory: Keep track of all integrated identity sources, IAM systems, and external tools
• Automation and Scripting
Improve system efficiency: Identify areas where automation could reduce manual intervention and improve operational efficiency