• State of North Carolina
  • $100,650.00 -147,230.00/year*
  • Fayetteville , NC
  • Information Technology
  • Full-Time
  • 315 Birnam Dr


Loading some great jobs for you...




Description of Work

Salary Grade: IT06
Recruitment Range: $$61,972.00 - $65,986.00

The Department of Information Technology (DIT) serves as the Technology Center for the State of NC. Services that DIT provides reach a client base of state and local government agencies, as well as schools, colleges and universities.

This position is assigned to the Department of Environmental Quality (DEQ) and is located in the Green Square office complex at 217 W. Jones Street in Raleigh, NC. It is part of the DIT@DEQ Security and Infrastructure Branch and is focused on information security. Specific areas of responsibility are firewall, VPN, and vulnerability management remediation.

Job responsibilities include but are not limited to:

? Firewall and VPN administration: Analyze generalized connectivity requests from users (developers, IT Operations staff, end users), map to appropriate and correct TCP/IP filters. Submit service requests for firewall and VPN changes to the DIT Service Portal and coordinate scheduling and testing of those changes. Provide technical guidance and troubleshooting support to DEQ's Endpoint Security Administrator related to host-based firewall/IPS configuration and management. Serve as a technical expert or specialist in networking, firewalls, and VPN.
? DNS administration: Primary contact with DIT and non-state DNS registrars; initiate record change requests and name transfers; troubleshoot name resolution and DNS firewall issues.
? Vulnerability management: Monitor scan results (vulnerability and compliance). Coordinate and verify remediation activities. Develop standard reports and generate ad-hoc reports as required.
? Perform other duties as assigned relating to general IT support functions within DEQ.
? Maintain knowledge of emerging trends involving information security, make recommendations, and act as a DEQ subject matter expert for information security. Knowledge, Skills and Abilities / Competencies
To receive credit for your work experience and credentials, you must document on your application that you possess all of the following:

? Technical Knowledge: Thorough understanding of the basic tenets (CIA) of security in complex environments.
? Technical Solution Development: Understand available methodologies of authentication and authorization and which is appropriate in particular settings. Work within own specialty with ability to integrate and coordinate elements of that specialty. Independently apply technical judgment to work assignments to achieve desired outcomes.
? Technical Support: Serve as a technical resource in solving security problems of high complexity. Solicit relevant information from client in order to solve, document, and effectively communicate solution to client. Communicate solutions to technician and other affected personnel to aid their future problem-solving ability.
? Consulting/Advising: Knowledge of the security industry and regulations that have an impact on the customer's business and data protection issues and the ability to provide appropriate solution set to address business needs. Determine client needs and effectively communicate back to technical experts. Act as technical resource to others within work specialty. The following Management Preferences are not required, but applicants that possess these skills are preferred:
? Professional Knowledge: Hold and maintain certifications such as SANS Global Information Assurance (GIAC) or Carnegie-Mellon (CERT). Examples are GIAC Security Essentials Certification (GSEC); CERT-certified Computer Security Incident Handler; or ISC2 Systems Security Certified Practitioner (SSCP).
? Experience with security information and event management.
? Sound knowledge of Windows operating systems (desktop and server).

Minimum Education and Experience Requirements
? Bachelor's degree in Computer Science, Computer Engineering or an Information Security degree or closely related field from an appropriately accredited institution and one year experience in IT Security;
? or Bachelor s degree from an appropriately accredited institution and two years of experience in IT Security or closely related area;
? or Associate's degree in Information Systems Security from an appropriately accredited institution and two years of experience in IT Security
? or closely related area;
or an equivalent combination of education and experience. Supplemental and Contact Information

To apply for this position, please click the \\\"Apply\\\" link above (on the Government Jobs website) or visit to complete an on-line application.

The Department of Information Technology will not accept \\\"See Resume\\\" or inserted text resumes in lieu of all work experience and education completed on the application.
Applicants applying for positions that require specific coursework, must upload and attach a copy of the transcript with their application.

Applicants seeking Veteran's Preference must answer \\\"Yes\\\" to the appropriate questions on the application regarding Veteran status and upload and attach a DD Form 214, Certificate of Release or Discharge from Active Duty with their application.

Employment at DIT is contingent upon a satisfactory background check.

DIT is an Equal Opportunity and Merit-Based Employer.

Due to the volume of applications received, we are unable to provide information regarding the status of your application over the phone. To check the status of your application, please log into your account. You will either receive a call to schedule an interview or an email notifying you when the job has been filled.

For technical issues with your Neogov account, contact Neogov Helpline at 855-###-####.

NC DIT Human Resources
Renee' Dixon
Phone No. 919-###-####
Fax No. 919-###-####

Associated topics: forensic, identity, iam, information security, information technology security, malicious, phish, protect, security, security engineer
Associated topics: forensic, idm, information assurance, information security, leak, malicious, security engineer, threat, violation, vulnerability

* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.

Launch your career - Upload your resume now!

Upload your resume

Loading some great jobs for you...