In this role, you will provide security policy interpretation, research, and development; information systems security; information technology research and analysis work; cyber security planning and implementation; industrial security work.
The IA Specialist will be required to work closely with the Government IAM, IAO, and IA specialist, providing the appropriate documentation to support accreditation for the production environment and maintain proper IA posture of the development environment.
In this role, you will perform analysis on logs produced by network devices utilized within the OCC such as firewalls, content filtering, syslog from various sources/devices, assorted Intrusion Detection capabilities, substantiating vulnerability scanner results, directory services, DHCP logs, Secure Email Gateway logs, and approved OCC applications.
In this role, the selected candidate will be studying, analyzing, developing, and implementing cybersecurity initiatives and policies to improve the quality, timeliness, and efficiency of cybersecurity processes.
As part of the Security Team, the position is responsible for implementing, operating, and managing security requirements both technical and administrative on classified system and unclassified systems.
The Successful candidate shall be responsible for overall compliance, identification of anomalies and coordination with Signature Management personnel to develop custom host-based signatures to automate the detection of events of interest.
In this role, you will provide security policy interpretation, research, and development; information systems security; information technology research and analysis work; cyber security planning and implementation; industrial security work; information technology policy/guidelines development; and information security work.
In this role, the selected candidate will ensure and maintain IAVA and STIG compliance and review all change requirements of the systems; perform assessments of new technologies being implemented at the various stages of the Systems Engineering Lifecycle.
In this role, you will establish complex operational software configuration controls and system interfaces for computer system(s) assigned. He / She will also analyze and troubleshoot system anomalies to ensure optimum equipment performance.
In this role, you will provides system design expertise to ensure that as new systems are designed, security implications and security requirements are incorporated into the system from the initial design phase.
In this role, the selected candidate will review and evaluate Information Systems Design Plans, Continuity of Operation Plans, Communication Plans, engineering change proposals and configuration changes for compliance with relevant security regulations, policies, and best industry practice.
In this role, you will design, develop, and coordinate the implementation of solutions that meet security requirements. The selected candidate will also provide integration and implementation of the computer system security solution.