Ege University Contracted IT Personnel Recruitment Announcement

public academic personnel public personnel recruitment and exams ege university contract informatics personnel recruitment announcement
public academic personnel public personnel recruitment and exams ege university contract informatics personnel recruitment announcement

Ege University Contracted IT Personnel Recruitment Announcement

CONTRACTED IT PERSONNEL PURCHASE ANNOUNCEMENT

About the Principles and Procedures Regarding the Employment of Contracted Information Technology Personnel in Large-Scale Information Processing Units of Public Institutions and Organizations published in the Official Gazette dated 375 and numbered 6 with the additional article 31.12.2008 of the Decree-Law No. 27097 to be employed in the IT Department of our University. Pursuant to Article 8 of the Regulation, 9 (nine) contracted IT personnel will be recruited with the placement to be made according to the success order of the written and oral exams.

I. APPLICATION REQUIREMENTS

A) GENERAL CONDITIONS:
a) To have the general conditions listed in Article 657 of the Civil Servants Law No. 48,
b) Graduates of faculties from four-year computer engineering, software engineering, electrical engineering, electronic engineering, electrical and electronic engineering and industrial engineering departments or from higher education institutions abroad whose equivalence has been accepted by the Higher Education Council,
c) Except for those specified in sub-paragraph (b), from the engineering departments of faculties that provide four-year education, departments of science-literature, education and educational sciences, departments that provide education on computers and technology, and statistics, mathematics and physics departments, or from a dormitory whose equivalence has been accepted by the Higher Education Council. Graduated from higher education institutions other than
d) Having at least 3 years of professional experience in software, software design and development, management of this process or installation and management of large-scale network systems, for those who cannot exceed twice the wage ceiling, and at least 5 years for others (In determining the professional experience; IT personnel; as a permanent employee subject to Law No. 657 or contracted services subject to Article 4 (B) of the same Law or the Decree-Law No. 399, and the service periods documented as IT personnel in worker status by paying premiums to social security institutions in the private sector are taken into account)
e) Documenting that they know at least two of the current programming languages, provided that they have knowledge about the hardware of computer peripherals and the security of the established network management.
f) Not receiving a retirement or old-age pension from any Social Security Institution,
g) For male candidates, having done their military service, being exempted or postponed,
h) Not being dismissed from public office or deprived of public rights by decree.
i) Not to have completed 40 (forty) years of age as of the first day of the application date for all announced positions (those born on 13.03.1983 and later will be able to apply.)

B) SPECIAL CONDITIONS:
In addition to the general application conditions, the following special conditions will be sought for the positions to be applied for.

1) CYBER SECURITY SPECIALIST (1 Person, Full Time, Up to 3 Times the Monthly Gross Contract Wage Ceiling)
a) Information Security in large-scale information processing units or in public institutions and organizations where there are critical types of data that may threaten national security or cause disruption of public order, or in system centers in the private sector with at least 1.000 (thousand) internal or 10.000 (ten thousand) external users or to document that he has worked as a System Specialist for at least 5 (five) years,
b) Documenting previous work on Information Security and the use of SIEM (Security Information Management and Security Event Management). (Document to be taken from the previous place of employment)
c) Having good knowledge or experience about Firewall, Intrusion Detection and Prevention System, Web Application Firewall System, e-mail Security System, SSL Encryption System and DDoS Attack Prevention System (to document that they have done these works in the institution they worked before),
d) To have worked on the security of server architectures and disk virtualization and virtualization technologies systems, or to have received documented training,
e) To have basic knowledge about software security,
f) Mastering the security modules on one or more of the Firewall products (IPS, IDS, WAF, DDOS, AV, NAC)
g) Having experience in penetration (penetration and vulnerability) tests, reporting and verification of findings,
h) Having knowledge of current attack types and the use of offensive tools,
i) To be able to perform malware analysis on Linux and Microsoft systems, to have experience in static and dynamic code analysis,
j) To have knowledge about network security and to perform network penetration testing,
k) To have worked in an institution for at least two of the ISO 27001, COBIT and KVKK processes,
l) To have knowledge of Active and Passive Information collection methods,
m) To be able to map the network,
n) Having knowledge of vulnerability scanning and access to the system, escalation of rights, infiltration of other systems, infiltration of other networks, access protection, deletion of trace records,
o) To perform penetration tests for mobile applications, internal and external networks, wireless networks, VPN systems and database systems,
p) Having received Applied White Hat Hacker (CEH) training,
q) Working with UNIX, Linux and Microsoft Server operating systems,
r) To have knowledge of Cyber ​​Incidents Response Team (SOME) management and documentation. (Owning with CEH certificate),
s) Having knowledge of Active Directory or Open LDAP security,
t) To have ISO 27001 (Information Security Management System) Standard training certificate.

PREFERABLY:
– Documenting that he/she served as a senior pentest in the last institution he/she worked for

2) NETWORK SPECIALIST (1 Person, Full Time, Up to 3x the Monthly Gross Contract Wage Ceiling)
a) At least 1.000 (five) years of experience in information networks in large-scale information processing units or in public institutions and organizations where there are critical types of data that may threaten national security or cause disruption of public order, or in system centers in the private sector with at least 5 internal or external users owning and documenting
b) Having experience in wide area networks and local area network cabling,
c) Local Area Network (LAN), Wide Area Network (WAN), Wireless Local Area Network (WLAN), Virtual Private Network (VPN), Dynamic Routing Protocols, SSL, DHCP, DNS, Proxy and IEEE 802.1x technologies, network control To have knowledge and experience on system, load balancing system,
d) To have knowledge and experience about infrastructure equipment,
e) Having experience in network monitoring and reporting,
f) To have experience in the installation, configuration and management of a router, backbone switch, edge switch (documenting the work he has done in the institution he worked before)
g) To have knowledge and experience in software that can analyze traffic and protocols on the network (such as wireshark, tcpdump, netcat),
h) To have knowledge about security systems (IDS/IPS, Firewall, Antivirus, Web Gateway, DDoS, E-mail Gateway, etc.),
i) Having knowledge of Windows, Linux and Unix based operating systems,
j) Local Area Network (LAN), TCP/IP, IPV4-IPV6, Wide Area Network (WAN), Wireless Local Area Network (WLAN), Virtual Private Network (VPN), SSL/TLS,
Having experience in Dynamic Routing Protocols, IEEE 802.1x network technologies,
k) To have knowledge and experience in Local Area Network (LAN) and Wireless Local Area Network (WLAN) access security issues,
l) To have experience about FREE RADIUS, NAC (Network Access Control) technology and hardware,
m) Having experience in the installation, management and reporting of Network Monitoring tools,
n) To have knowledge about DNS, DHCP,
o) To have experience in routing, switching and wireless configuration and management,
p) To have knowledge and experience in system room transportation and design,
r) To have knowledge about information security processes, business continuity, risk analysis or risk management.

PREFERABLY:
– Having CCNA (Cisco Certified Network Associate) or CCT certificates,
- To have experience in security and business continuity of network devices,
– To have information about ISO 27001 (Information Security Management System) and Information Technologies Infrastructure Library (ITIL)

3) SENIOR SOFTWARE DEVELOPMENT SPECIALIST (1 Person, Full Time, Up to 3x the Monthly Gross Contract Wage Ceiling)
a) Having at least 5 (Five) years of experience in software design and development and management of this process in IT units (public or private sector) and documenting it,
b) To have knowledge and experience in database architecture and design,
c) Having a good command of design patterns,
d) To have experience in process management, process analysis, process modeling and process improvement,
e) To ensure that the software requirements of the corporate units are determined correctly, to prepare the scope document, to prepare the functional design and analysis documents, to prepare test scenarios, to test the products whose software has been completed, to check whether the existing applications work correctly and to take the necessary actions,
f) Having experience in SOA and MicroService architecture and DevOps,
g) To have experience in large-scale multi-layer (web-based) application development, Windows Services and Web Services,
h) Good knowledge of .NET technologies and experience in application development in a multi-user project
i) Having knowledge and experience in front-end technologies such as Angular, React, VueJs,
j) Oracle, PostgreSQL, MySQL and MSSQL etc. To have knowledge about relational databases and to have experience in application development using at least one,
k) To be experienced in TFS, GIT, SVN version control systems,
l) Knowledge of software development lifecycle (SDLC) methodologies,
m) Having knowledge of project and software process standards (such as agile software/SCRUM),
n) To have knowledge about software security.

Click for details