Job Descriptions

Use this tool to access job descriptions for your next hire. Search by skills or job titles and download the job description to help you get started. Tip: You can use this tool to help ensure your own resume is up-to-date with the latest job requirements.

You may search job titles by skills within selected career category
Information System Security Officer (ISSO)
Chief Information Security Officer (CISO)
Information Security (IS) Auditor
Security Architect
Security Automation Engineer
Secure Software Assessor
Cryptographer/Cryptanalyst
Information Systems Security Developer
Operational Technology Systems Analyst
Security Engineer
Supply Chain Security Analyst
Security Testing and Evaluation Specialist
Identity Management & Authentication Support Specialist
Encryption / Key Management Support Specialist Data Privacy Specialist
Cybersecurity Operations Technician
Cybersecurity Incident Responder
Cybersecurity Malware Specialist
Digital Forensics Analyst
Cybersecurity Operations Analyst
Vulnerability Assessment Analyst
Information Systems Security Manager - Cybersecurity Operations
Threat Hunter
Cybersecurity Operational Technology Incident Responder
Penetration Tester
Data Scientist (AI)
Systems Analyst
User Interface Designer
Developer
Data Scientist (Tech)
Architectural Designer
Project Manager
Legal Compliance Officer
IT Auditor
Automation Process Engineer
IT Author / Technical Writer
Clinical Researcher / Coordinator
Machine Learning Engineer
Social Media Manager
Systems Engineer
Computer Vision Engineer
IT Service Manager
Data Analyst
Product Manager
Policy Analyst
Learning and Development Specialist
Cognitive Copywriter
Front End Developer
Technical Recruiter
Business Analyst
User Experience Designer
Programmer
Full Stack Developer
Data Engineer
Software Engineer
Deep Learning Engineer
Medical Coder/Programmer
Human Resources Analyst
Robotics Process Analyst
Online/Digital Learning Developer
Network and Systems Administrator
Systems Architect
Tech Sales and Customer Service
Graphic and Animation Designer
IT Program Manager
Web Developer
Business Intelligence Analyst
IT Procurement Officer
Digital Marketing / Communications

Encryption / Key Management Support Specialist

OPERATE & MAINTAIN

Skills

Job Description

Other Titles Include

  • Access management analyst
  • System analyst
  • Identity, credentials and access management (ICAM) specialist

Note: This role is most commonly found in large or medium-sized organizations.

Reporting relationship

To be completed by the user of this job description as appropriate.

Job purpose / summary

Provides ongoing support to management and maintenance of virtual private networks, encryption, public key infrastructure, and, in some cases, Communications Security (COMSEC) in support of organizational IT security.

Duties and responsibilities

  • Identify client requirements and propose technical solutions
  • Install, configure, operate, maintain and monitor related applications
  • Developing and applying security system access controls.
  • Deploy, configure and manage encryption/key management services
  • Establish VPNs
  • Analyze patterns or trends for further resolution
  • Manage identity change-request approval processes
  • Audit, log and report user life-cycle management steps against access control list on managed platforms
  • Configure and manage federated identity, credentials, access management tools in compliance with security policy, standards and procedures
  • Complete tasks related to authorization and authentication in physical and logical environments
  • Develop, deliver, and oversee related cybersecurity training material and educational efforts related to role

Tools and Technologies

  • Identity and access management systems
  • Encryption and key management tools, processes and procedures
  • VPN and Wi-fi encryption tools and procedures
  • Authentication tools and services
  • Security event and incident management systems and/or incident reporting systems and networks

Competencies

KSAs applied at the basic level:

  • Cryptanalysis
  • Cryptography and encryption concepts and methodologies
  • Symmetric and asymmetric cryptography
  • Steganography and Steganalysis
  • National cryptologic authorities (Communications Security Establishment)
  • Public key infrastructure providers

KSAs applied at the advanced level:

  • Organizational information technology (IT) user security policies (e.g., account creation, password rules, access control)
  • Network access, identity, and access management protocols, tools and procedures
  • National and international standards
  • Authentication, authorization, and access control methods
  • PKI (Public Key Infrastructure), HSM (Hardware Security Module), Digital Certificate, SSL/TLS (Secure Sockets Layer / Transport Layer Security), SSH (Secure Shell), current encryption technologies
  • Related application life-cycle processes
  • Digital signatures, digital certificates, and digital certificate management
  • Authentication protocols
  • VPN and Protocols
  • File and Disk Encryption
  • Encryption Algorithms
  • Organizational analysis of user and business trends
  • Client consultation and problem resolution

Direct reports (if appropriate)

To be completed by the user of this job description as appropriate

Qualifications

Education. College diploma in IT field. Training in relevant encryption and key management technologies at the applied level or equivalent training and experience.

Certifications.

To be completed by the user of this job description as appropriate

Other relevant qualifications.

To be completed by the user of this job description as appropriate

Key Attributes.

To be completed by the user of this job description as appropriate

Experience. Experience in managing directory services and working in a security environment.

This is an often an entry-level job to the security domain after gained experience with network or system administration access management and credentials. With additional training and experience there is potential for more technically or operationally focused roles as well as management opportunities.

Working conditions (if required)

If the job requires a person to work in special working conditions this should be stated in the job description. Special working conditions cover a range of circumstances from regular evening and weekend work, shift work, working outdoors, working with challenging clients, and so forth.

Physical requirements (if appropriate)

If the job is physically demanding, this should be stated in the job description. A physically demanding job is one where the incumbent is required to stand for extended periods of time, lift heavy objects on a regular basis, do repetitive tasks with few breaks, and so forth.