TheFORCE wrote: » On my team the Security/Network engineers do 100% tech work, implementation type work and 100% monitoring of web traffic and project implementations. I do about 60% tech implementations and 40% policy work but my title is not Security Engineer though, just analyst. So based on that and you will hear it from other people too, you really cant tell what a job entails by just the title, you need to know the job responsibilities as they are described in the job description. 80% policy 20% doesn't sound like a security engineer role to me based on my experience especially since they require ISSEP, that's more of management and designing frameworks, that's why the 80% policy.
gespenstern wrote: » ISSEP exam is almost 100% about policies, standards and frameworks. Not sure if there's any tech at all.
Cyberscum wrote: » Having said that it looks like they might be looking for a policy guy with the weird request of ISSEP.
devilbones wrote: » Is this job with the Navy?
jamthat wrote: » We're split into Audit, Engineering (with an architect), and Operations. Our engineers are mainly involved with project work (POC, implement/replace projects, major design/redesign/upgrade, etc) as well as a top-level escalation point for troubleshooting/IR (still ironing that out). Part of project close-out is a handoff to operations, where basically all day-to-day operation transitions down..then, onto their next projects. Still a pretty new group, but right now I'd put engineering at about 90% technical. Over time it will probably be closer to 70/30 technical/policy split.
gespenstern wrote: » That would be my guess. I don't have ISSEP myself (there are plans though), but judging from "ISSEP passed" threads on here it looks like it is very heavy on frameworks. Don't know why (ISC)2 decided to put "engineer" word into this exam, but it doesn't look like it has many things in common with things that are discussed for example in Ross Anderson's "Security Engineering" book which is widely regarded as a foundation stone in engineering field.
Cyberscum wrote: » How did you like the ISSAP? After reviewing the two I think I would enjoy the ISSAP much more than the ISSEP.
Cyberscum wrote: » What exp does the sec engineers on your team have?
gespenstern wrote: » It was awesome. I was overprepared though. But it was really technical, tons of crypto, tons of various complex scenarios like considerations during mergers & acquisitions of kerberos realms, tons of PKI scenarios involving cross-certifications, various tricky situations with revocations, etc. Very technical, not boring at all as I expect ISSEP is going to be.
TheFORCE wrote: » I dont know exactly their previous experience but i know that they are very senior with the company so they started from the very entry level Helpdesk and Windows sys administration. Jamthat above nailed exactly what they do, very involved with network redesign, involved with mergers, domain decommissions, setup of VPN tunnels etc. I believe one of them only has Sec+ and the other probably has an MCSA so they transitioned in these positions as the company started to grow and learned by using the tools and gaining experience on the job. As long as it stays like that they will stay, if they ever have to do policy type work they will probably move on. When it comes to policy they involve me by providing input and suggestions and assisting with the technical requirements behind the policy and then I write it. As i mentioned earlier my work is split between 70/30 tech/policy now but with the introductions of automation the policy becomes really easy to write so in terms of time spend, I'd say I spend close to 85/15 tech/policy. The technical implementations take longer to setup through automation during the project phases than what it takes to write the policy. One thing we do not do though is that we do not hand off to operations(IT) what we complete. Whatever project we complete, we manage from start to finish and we maintain/support it through the entire life cycle. So in that regards our Infosec team and the security engineer/analyst is only growing in responsibilities and it doesn't hurt that all of us report directly to the CISO and no middle management bs stuff. So we get to have some influence on many things.
Cyberscum wrote: » Perfect! This will be my next challenge. Do you mind sharing any study tips or resources? I plan on the official study guide and I have access to FEDVTE which has some modules. Anything would help!
Cyberscum wrote: » Interesting. Our group is slit up with multiple ISSO's and two ISSM's. Most of the tech work is done by the ISSO's and almost all policy for the ISSM. The "security engineer" position I have not heard of. Maybe its more of a civilian title, but from the sound of it its more of an technical ISSO role. If that's the case I'm in. What kind of credentials do your security engineers have? I'm wondering because with the CISSP-ISSE req for the job it sounds like more of a policy job.
Cyberscum wrote: » That's awesome to be able to grow within a company without requirements. Its the way it should be but in the gov there are ever growing requirements for certs...which is all about money. Looks like I will head towards the ISSAP route, do you have any ambitions of going for a concentration?
reload@ wrote: » They listed ISSEP for the DoD 8570: IASAE III requirement.
TechGuy215 wrote: » Network Security Engineer here! Speaking from my own experiences... IMO Security Engineer is a more technical position...closer to 100% technical responsibilities while of course adhering to policies and procedures. My daily duties: Vulnerability Management Firewall Management IPS/IDS Management Web Content Filtering Management Penetration Testing Management Antivirus Management SIEM Management DLP Management And a lot more.... Typically your Sec Engineer is going to be the SME regarding implementation, monitoring and maintenance of all Security Technical Controls. Policy is usually left to Security Analysts and Compliance and Security Administrators...
gespenstern wrote: » In this case they will accept ISSAP as well.
TechGuy215 wrote: » Network Security Engineer here! Speaking from my own experiences... .... Vulnerability Management Firewall Management IPS/IDS Management Web Content Filtering Management Penetration Testing Management Antivirus Management SIEM Management DLP Management ...
UnixGuy wrote: » So basically 'Management' of Firewalls/IPS/IDS/PenTesting/DLP/SIEM Can you please explain what management here means exactly? Do you install/configure the firewalls? Do you add rules? Do you install F5? do you configure F5? Do you configure WAFs? Do you design WAFs? Do you configure the IPS rules? Do you desing install it? Do you write policies for DLP? Do you handle incidents generated by DLP? Do you configure the SIEM and the dashboards there? Do you analyse the logs? Do you configure the web content filtering? handle the logs? Do you configure the Anti Virus? Do you deal with End Point security? What is Penetration testing management? Do you actually do any penetration testing or do you overlook reports provided by third party that do the actual penetration testing? (This seems like a lot of technologies to be an SME for!) I'm just asking so I can better understand what's required in some of the security engineers position as I'm trying to get one