This position is responsible for monitoring compliance with the IA program throughout the organization. Assist with the design, development, implementation, and management of an effective information system security program.
In this role, the successful candidate will develop and maintain automated information technology security monitoring and reporting mechanisms; develops and maintains various network security control systems such as firewalls, intrusion detection/protection systems, wireless networks, remote access, proxy servers, anti-virus solutions, and network account access.
In this role, you will be responsible for assessing disn subscriber environment security posture and topology, reviewing security relevant documentation, and preparing technical papers discussing the results of this analysis.
In this role, the selected candidate will collaborate with all internal security teams and vendors to implement security controls; maintain active understanding of industry practices for threat analytics and incident response.
In this role, you will provide information assurance support for application development that includes system security certifications and project evaluations for firewalls that encompass the development, design, and implementation.
The Security Engineer implements and provides technical support for enterprise client security and identity management solutions; work with the Help Desk and other IT service areas to resolve issues and enhance services.
In this role, you will develop analysis plans, lead inter/intra organizational teams, conduct analyses, interpret results and develop recommendations for improving threat detection and classification or reducing vulnerability of detection.
In this role, the selected candidate
must have experience with system integration, testing, installation, development and update of technical documentation, accreditation, operation, and maintenance and transition to operations.
In this role, you will determines resources available to support enforcement of security processes in conformance with applicable information security policies, standards, procedures and controls. Identifies information security opportunities and recommends process or technology enhancements.
In this role, you will provide support to PM TR by performing IA scans, developing IA accreditation packages, and preparing the Program Protection Plan and other IA documentation for review and submission in meeting DoD Milestones.
In this role, you will support exercises and training through table top exercises or development of TTPs, to include approaches for cyber key terrain identification, and exercise planning, observations, execution, and analysis
In this role, the selected candidate will ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
In this role, you will conduct required information system vulnerability scans according to risk assessment parameters. Initiate protective and corrective measures when a security incident or vulnerability is discovered with ISSM or CSO approval.
In this role, you will perform cyber risk assessment and solution engineering for critical infrastructure systems (e.G., hull, mechanical, and electrical (hm&e) or installation industrial control systems (ics).