Design, test, and implement secure operating systems, networks, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions.
The Information Systems Security Engineer shall perform; or review; technical security assessments of computing environments to identify points of vulnerability; non-compliance with established Information Assurance (lA) standards and regulations; and recommend mitigation strategies.
As a Security Analyst, you will support multiple commercial and Federal security engagements assessing security risk, conducting security assesmnts, supporting ISSOs, remediating security vulnerabilities, and providing general security consulting services.
Performs a variety of forensic and electronic discovery services, including digital evidence preservation, forensic analysis, data recovery, tape recovery, electronic mail extraction, and database examination.
Responsible for providing technical guidance focused on information security architecture. Performs security research, analysis, and design for assigned client computing systems and the network infrastructure.
In this role, you will perform cyber threat analysis and reporting on information from both internal (private sector/bank) and external (government) sources and appropriately handle classified materials and operate in a US government secure facility.
In this role, you will initiate and complete performance and functionality testing of all enterprises operating system builds by using automated testing tools and also provides related troubleshooting assistance to desktop support teams.
The position will support the onsite Cyber/IA Security Lead implementing and improving technology and procedures related to vulnerability management, device hardening, and cyber security incident response.
Manage and administer all security aspects for multiple programs, including implementing physical, program, facility and information security requirements to ensure compliance with NISPOM, DCIDs, ICDs, federal security regulations and information security requirements.