In this role, you will provide guidance or countermeasures to defend against the threat. The selected candidate will respond to cyber-security incidents by reporting all pertinent information on local incident.
Provides expertise and guidance in interpreting policies, regulatory and/or governmental regulations, and agency guidelines to assure compliance. Works directly with operating entities to provide process analyses oversight on a continuing basis to enforce requirements and meet guidelines.
Leads audit and inspection preparation, resolution of audit and inspection findings and liaises with auditing groups and inspectors through all stages of the audits. Co-ordinates legal requests in support of government investigations or litigations.
In this role, the selected candidate will develop test strategies, test plans, and test cases for applications mostly written in C and C++; create automated test scripts and test software for iterative and incremental software development efforts.
In this role, the selected candidate will collaborate with SCRUM/project team members and End-Users to understand the key processes and technologies within the Applications for the supported business functions.
In this role, you will be responsible performance indicators and core measure data analysis, reporting the data, and development and implementation of an improvement plan to assure performance goals are met.
In this role, the selected candidate will perform quality assurance tasks of a technical nature including but not limited to peer reviews, review of design change orders, auditing of engineering processes as well as working as part of a multi disciplined engineering project team.
In this role, you will perform analysis of business needs and requirements, eliciting requirements from various stakeholders, build consensus and define scope and detailed requirements for specific proposed business solutions.
In this role, the selected candidate will be responsible to analyzes design and determines test scripts, coding, automation, and integration activities required based on general objectives and knowledge of overall architecture of product or solution.
In this role, the selected candidate will analyze security event audit log information from network security devices (e.g., network and host-based security systems, firewalls, routers, switches, etc.) and mission critical servers for anomalies and known attack patterns.