The IA Specialist will be required to work closely with the Government IAM, IAO, and IA specialist, providing the appropriate documentation to support accreditation for the production environment and maintain proper IA posture of the development environment.
In this role, you will include providing Program/Project management support to customer driven Risk Management Framework (RMF) accreditation efforts for new and existing systems, recommend security controls for federal information systems.
In this role, you will perform analysis on logs produced by network devices utilized within the OCC such as firewalls, content filtering, syslog from various sources/devices, assorted Intrusion Detection capabilities, substantiating vulnerability scanner results, directory services, DHCP logs, Secure Email Gateway logs, and approved OCC applications.
In this role, you will provide security policy interpretation, research, and development; information systems security; information technology research and analysis work; cyber security planning and implementation; industrial security work.
In this role, you will design, develop, and coordinate the implementation of solutions that meet security requirements. The selected candidate will also provide integration and implementation of the computer system security solution.
In this role, you will establish complex operational software configuration controls and system interfaces for computer system(s) assigned. He / She will also analyze and troubleshoot system anomalies to ensure optimum equipment performance.
The Successful candidate shall be responsible for overall compliance, identification of anomalies and coordination with Signature Management personnel to develop custom host-based signatures to automate the detection of events of interest.
In this role, the selected candidate will be studying, analyzing, developing, and implementing cybersecurity initiatives and policies to improve the quality, timeliness, and efficiency of cybersecurity processes.
In this role, the selected candidate will ensure and maintain IAVA and STIG compliance and review all change requirements of the systems; perform assessments of new technologies being implemented at the various stages of the Systems Engineering Lifecycle.
In this role, you will provide security policy interpretation, research, and development; information systems security; information technology research and analysis work; cyber security planning and implementation; industrial security work; information technology policy/guidelines development; and information security work.