Security Engineer Sample Clauses

Security Engineer. Experience serving as the security engineer of complex technology implementations in a product-centric environment. Comfortable with bridging the gap between legacy development or operations teams and working toward a shared culture and vision. Works tirelessly to ensure help developers create the most secure systems in the world while enhancing the privacy of all system users. Experience with white-hat hacking and fundamental computer science concepts strongly desired. Primarily responsible for: ● Performing security audits, risk analysis, application-level vulnerability testing, and security code reviews ● Develop and implement technical solutions to help mitigate security vulnerabilities ● Conduct research to identify new attack vectors Experience setting up teams for successful delivery by removing obstacles (or blockers to progress), constantly helping the team to become more self-organizing, and enabling the work the team does rather than impose how it’s done. Manages one or more agile projects, typically to deliver a specific product or transformation via a multi-disciplinary, high-skilled digital team. Adept at delivering complex digital projects, breaking down barriers to the team, and both planning at a higher level and getting into the detail to make things happen when needed. Defines project needs and feeds these into the portfolio/program process to enable resources to be appropriately allocated. Primarily responsible for: ● Deliver projects and products using the appropriate agile project management methodology, learning & iterating frequently ● Work with the Product Manager to define the roadmap for any given product and translate this into user stories ● Lead the collaborative, dynamic planning process -- prioritizing the work that needs to be done against the capacity and capability of the team ● Matrix-managing a multi-disciplinary team ● Ensure all products are built to an appropriate level of quality for the stage (alpha/beta/production) ● Actively and openly share knowledge of best practices Category 11 - Agile Coach Experience transforming initiatives to deliver lasting change within agencies that focus on delivering value for citizens. Coaches may be required to work either: ● at the team level, working with teams to ensure that delivery teams within agencies are adopting agile and performing effectively ● at the portfolio or program level, to help agencies to establish the right processes for managing a portfolio of work in an agile...
AutoNDA by SimpleDocs
Security Engineer. Tier 3 5 Reviews device configuration, configuration changes, installs updates to device software (filters, profiles and patches) to ensure completeness and accuracy. Defines repeatable methods for resolving issues- creates new 'known issue' resolutions. Monitors device health and performance using pre-set or standard dashboards and reports. Creates new dashboards, queries and reports for use by support team and customers. Troubleshoots new or unknown issues escalated from Tier1 or Tier2 Engineers, directs Tier1 and or Tier2 to resolve issue. Addressed issues requiring escalation to Vendor (e.g., RMA activities) escalate to Tier3. Supervises Tier 1 and Tier2 Engineers. Five (5) or more years of IT security experience with managing devices of similar type. Resource Unit Resource Type Minimum Yrs/ Exp Role Qualifications Security Incident Management Incident Engineer 5 Reviews documentation (response preparedness plan, network documentation, current incident data and summaries - as available), interviews customer personnel, captures incident event and activity data, identifies potential issues, breach, or system compromise, makes recommendations for mitigation and remediation, participates on working sessions, conference and status calls, documents and presents final incident reports. Five (5) or more years of security and/or incident response experience. Possesses a practitioner's understanding of the incident response process. Digital Forensic Investigation Digital Analyst 5 Configures digital forensic tools to capture forensic data from target platforms. Performs analysis of captured data to identify evidence of indicators of compromise (IoCs), identify data (source IP, Destination IP, Ports, Protocols) related to suspicious traffic, documents and presents forensic investigation reports. Five (5) or more years of security and/or audit compliance experience. Possesses a practitioner's understanding of digital forensics requirements and process. Response Preparedness Incident Engineer 5 Performs documentation reviews, interviews customer personnel, captures preparedness support data, identifies response gaps, makes recommendations for addressing gaps, documents and presents finding and recommendation reports. Five (5) or more years of security and/or incident response experience. Possesses a practitioner's understanding of the incident response process. Resource Type Minimum Yrs/ Exp Role Qualifications Security Risk Assessment Rate Card Senior Engineer 5 P...
Security Engineer. The Security Engineer participates in all phases of development as needed to identify, diagnose, and mitigate security risks as early and effectively as possible. S6: ATTACHMENT/TECHNICAL EXHIBIT LISTING
Security Engineer. Services Contractor shall provide services in accordance with the following requirements and capabilities: Experience serving as the security engineer of complex technology implementations in a product-centric environment. Comfortable with bridging the gap between legacy development or operations teams and working toward a shared culture and vision. Works tirelessly to ensure help developers create the most secure systems in the world while enhancing the privacy of all system users. Experience with white-hat hacking and fundamental computer science concepts strongly desired. Primarily responsible for: Performing security audits, risk analysis, application-level vulnerability testing, and security code reviews Develop and implement technical solutions to help mitigate security vulnerabilities Conduct research to identify new attack vectors. $ $ U. Technical Architect Services Contractor shall provide services in accordance with the following requirements and capabilities: Experience serving as the manager of complex technology implementations, with an eye toward constant reengineering and refactoring to ensure the simplest and most elegant system possible to accomplish the desired need. Understands how to maximally leverage the open source community to deploy systems on infrastructure $ $ as a service providers. Comfortable with liberally sharing knowledge across a multi-disciplinary team and working within agile methodologies. A full partner in the determination of vision, objectives, and success criteria. Primarily responsible for Architecting the overall system, by using prototyping and proof of concepts, which may include: modern programming languages (e.g., Ruby, Python, Node.js) and web frameworks (e.g., Django, Rails) modern front-end web programming techniques (e.g., XXXX0, XXX0, RESTful APIs) and frameworks (e.g., Twitter Bootstrap, jQuery) relational databases (e.g., PostgreSQL), and “NoSQL” databases (e.g., Xxxxxxxxx, MongoDB) automated configuration management (e.g., Chef, Puppet, Ansible, Salt), continuous integration/deployment, and continuous monitoring solutions Use of version control systems, specifically Git and GitHub Ensuring strategic alignment of technical design and architecture to meet business growth and direction, and stay on top of emerging technologies Decomposing business and system architecture to support clean-interface multi-team development Developing product roadmaps, backlogs, and measurable success criteria, and writing u...

Related to Security Engineer

  • Security Audit Customer agrees that PROS’ Audit Report will be used to satisfy any audit or inspection requests by or on behalf of Customer, and PROS will make Audit Reports available to Customer upon request. PROS will promptly remediate any material weaknesses or significant control deficiencies identified in any Audit Reports. In the event that an audit opinion is qualified and the qualification has not been remediated by the date of the Audit Report, PROS shall (i) provide Customer with PROS remediation plan; and (ii) execute such plan in accordance with its terms.

  • Contractor Security Clearance Customers may designate certain duties and/or positions as positions of “special trust” because they involve special trust responsibilities, are located in sensitive locations, or have key capabilities with access to sensitive or confidential information. The designation of a special trust position or duties is at the sole discretion of the Customer. Contractor or Contractor’s employees and Staff who, in the performance of this Contract, will be assigned to work in positions determined by the Customer to be positions of special trust, may be required to submit to background screening and be approved by the Customer to work on this Contract.

  • Security Audits Each Contract Year, County may perform or have performed security reviews and testing based on an IT infrastructure review plan. Such testing shall ensure all pertinent County security standards as well as any customer agency requirements, such as federal tax requirements or HIPPA.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Security Assessment If Accenture reasonably determines, or in good faith believes, that Supplier’s security practices or procedures do not meet Supplier’s obligations under the Agreement, then Accenture will notify Supplier of the deficiencies. Supplier will without unreasonable delay: (i) correct such deficiencies at its own expense; (ii) permit Accenture, or its duly authorized representatives, to assess Supplier’s security-related activities that are relevant to the Agreement; and (iii) timely complete a security questionnaire from Accenture on a periodic basis upon Accenture’s request. Security issues identified by Accenture will be assigned risk ratings and an agreed-to timeframe to remediate. Supplier will remediate all the security issues identified within the agreed to timeframes. Upon Supplier’s failure to remediate any high or medium rated security issues within the stated timeframes, Accenture may terminate the Agreement in accordance with Section 8 above.

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security Clearances A. The General Contractor is to supply the Court with names, dates of birth, and social security numbers of all employees who will be on site. This information must be submitted one (1) week prior to access to the site. The Court has final word on who will or who will not be allowed on the project premises.

  • Construction Clearing All timber is designated for cutting that is within the clearing limits of roads constructed hereunder or is in other authorized clearings. All dead or unstable live trees are designated for cutting that are sufficiently tall to reach Purchaser’s landings or the roadbed of Specified and Temporary Roads when Marked in advance of felling of timber in the immediate vicinity. Pieces meeting Utilization Standards from such dead or unstable live trees shall be removed, unless there is agreement that to do so could damage the road. Such designation may be revised as part of agreed changes in road location under B5.2.

  • Collateral Reports Borrower shall deliver or cause to be delivered the following:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!