Securely Provision
Systems Development
Ukraine
Kyiv
Full Time
Part-Time
Freelance
Temporary
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Knowledge of cybersecurity and privacy principles.
Knowledge of computer algorithms.
Knowledge of encryption algorithms
Knowledge of database systems.
Knowledge of organization's enterprise information security architecture.
Knowledge of electrical engineering as applied to computer architecture (e.g., circuit boards, processors, chips, and computer hardware).
Knowledge of installation, integration, and optimization of system components.
Knowledge of human-computer interaction principles.
Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
Knowledge of local area and wide area networking principles and concepts including bandwidth management.
Knowledge of microprocessors.
Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
Knowledge of operating systems.
Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
Knowledge of parallel and distributed computing concepts.
Knowledge of process engineering concepts.
Knowledge of software development models (e.g., Waterfall Model, Spiral Model).
Knowledge of software engineering.
Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools.
Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design.
Knowledge of telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing).
Knowledge of interpreted and compiled computer languages.
Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations.
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).
Knowledge of Personally Identifiable Information (PII) data security standards.
Knowledge of Payment Card Industry (PCI) data security standards.
Knowledge of cryptology.
Knowledge of embedded systems.
Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
Knowledge of network design processes, to include understanding of security objectives, operational objectives, and trade-offs.
Knowledge of access authentication methods.
Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
Skill in designing the integration of hardware and software solutions.
Skill in developing and applying security system access controls.
Skill in discerning the protection needs (i.e., security controls) of information systems and networks.
Skill in conducting audits or reviews of technical systems.
Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.
Ability to produce technical documentation.
Ability to translate data and test results into evaluative conclusions.
Ability to apply network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
Ability to apply secure system design tools, methods and techniques.
Ability to apply system design tools, methods, and techniques, including automated systems analysis and design tools.
Ability to participate as a member of planning teams, coordination groups, and task forces as necessary.
Ability to understand objectives and effects.
Ability to understand the basic concepts and issues related to cyber and its organizational impact.
Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.