Maintain excellent relationships with the customer as well as with members of the immediate organization. Document the physical environment and its changes. Personnel are expected to support and maintain timely configuration records, and support shift work and overtime as required. Applicant must hold a current top secret clearance and receive program access within a reasonable amount of time.
In this role, you will perform accurate and precise real-time analysis and correlation of logs/alerts from a multitude of client devices with a focus on the determination of whether said events constitute security incidents.
Candidate will ensure that classified information systems (IS) are in compliance with the JSIG and/or government directives; contract dependent; candidate will assist with interpretation of government security directives to determine technical Information Assurance (IA) requirements and prepare System Security Plans, Profiles, and Certification Reports.
Analyze application security needs based on the sensitivity or proprietary nature of the data and work with the appropriate teams to develop and execute new or existing security technologies or processes to support the business strategy.