Student Veterans of America Jobs

Welcome to SVA’s jobs portal, your one-stop shop for finding the most up to date source of employment opportunities. We have partnered with the National Labor Exchange to provide you this information. You may be looking for part-time employment to supplement your income while you are in school. You might be looking for an internship to add experience to your resume. And you may be completing your training ready to start a new career. This site has all of those types of jobs.

Here are a few things you should know:
  • This site is mobile friendly. You do not need a log-in or password to access information.
  • Jobs on this site are original and unduplicated and come from three sources: the Federal government, state workforce agency job banks, and corporate career websites. All jobs are vetted to ensure there are no scams, training schemes, or phishing.
  • The site is refreshed daily to remove out-of-date content.
  • The newest jobs are listed first, so use the search features to match your interests. You can look for jobs in a specific geographical location, by title or keyword, or you can use the military crosswalk. You may want to do something different from your military career, but you undoubtedly have skills from that occupation that match to a civilian job.

Job Information

Huntsville Utilities Information Security Administrator (3083) in Huntsville, Alabama

Job Statement:This is an advanced level position in the IT section, and may serve in multiple capacities within network, IT, Technical Services systems and other cyber security related areas. Provides and participates in network and systems security design and/or implementation. Documents and supports installation, analysis, maintenance and monitoring of Huntsville Utilities local area network (LAN), a wide area network (WAN), Internet and Intranet interfaces, SCADA, Microsoft M365 and other networks. Requires knowledge and current experience in the IT security field, with a focus on network, desktop, database, application, ecommerce, and business process security. Should be familiar with use and monitoring of SIEM products, both internal and external to HUs networks. Acts as a liaison with internal and external entities, developing policies and procedures. Proactively monitors standards and regulatory requirements. Partners with staff to support security compliance and audit programs, establish assessments, manages and tracks risk mitigation and remediation activities.

Essential Duties:

  1. Participates in the design, development and administration of security policies, standards, procedures and systems for existing and proposed computer networks and systems. Works with network and system administrators, analysts and other personnel to install, configure, implement and monitor all aspects of cyber security.
  2. Recommends and studies network and systems changes and expansions.
  3. Stays current with Microsoft Windows and network tools and best security practices.
  4. Will be required to document security settings and policies and prepare formal security reports.
  5. Understands and uses security tools, including SIEM, anti-virus, DLP, EDR, XDR, vulnerability scanners, IPS and IDS, firewalls, etc.. Must be able to analyze security logs and prepare security and incident response reports as needed.
  6. Responsible for continuous review, recommendation, and implementation of best security practices, for both on-prem and cloud-based environments. Ensures security controls are defined, executed, and documented.
  7. Assists with budget planning and IT governance processes.
  8. Understands and follows the tenants of business process modeling, change management, risk analysis and root cause analysis.
  9. Makes recommendations on appropriate physical and technical security controls.
  10. Develops Information Security policies and procedures in accordance with FERC, NERC, NIST, ISO, CISA and/or other internal or external standards, regulations or needs.
  11. Makes and/or reviews changes to external and internal network setup, firewall and VPN connections and other related items.
  12. Works with team members in the design and implementation of M365 security controls.
  13. Monitor alerts, policy compliance, licensing, auditing and governance aspects of the Microsoft M365 environments, including patching and updates, scheduled jobs, KPIs and other related tasks or outputs.
  14. Actively works with the Companys functional departments and end users to implement practices that meet defined policies and standards for information security. Identifies potential information security risks and opportunities throughout the organization.
  15. Assist with penetration testing, audits and vulnerability assessments.
  16. Actively participates with other groups and teams to develop and enforce vendor risk management, security awareness, information access management, data protection and governance.
  17. Establish and manage relations with vendors and related equipment suppliers.
  18. Develops and delivers appropriate end-user presentations, documentation and training materials to promote information security awareness company wide.
  19. Participates in the development of enterprise-wide and business unit recovery and continuity plans. Coordinates efforts of business units in the development of recovery procedures for interdependent processes, and maintains detailed emergency response, triage, command and control procedures.
  20. Performs other duties as assigned.
DirectEmployers