In this role, you will develop analysis plans, lead inter/intra organizational teams, conduct analyses, interpret results and develop recommendations for improving threat detection and classification or reducing vulnerability of detection.
In this role, the selected candidate will collaborate with all internal security teams and vendors to implement security controls; maintain active understanding of industry practices for threat analytics and incident response.
In this role, you will support exercises and training through table top exercises or development of TTPs, to include approaches for cyber key terrain identification, and exercise planning, observations, execution, and analysis
In this role, the selected candidate supports and maintains routers, switches, wireless access points, and related infrastructure environments; proactively analyzes trends and suggests system improvements.
The Security Engineer implements and provides technical support for enterprise client security and identity management solutions; work with the Help Desk and other IT service areas to resolve issues and enhance services.
In this role, the successful candidate will develop and maintain automated information technology security monitoring and reporting mechanisms; develops and maintains various network security control systems such as firewalls, intrusion detection/protection systems, wireless networks, remote access, proxy servers, anti-virus solutions, and network account access.
In this role, the selected candidate must have demonstrable expertise around specifying, designing, and/or implementing system health, performance monitoring tools, and software management tools for production environments.
In this role, you will perform cyber risk assessment and solution engineering for critical infrastructure systems (e.G., hull, mechanical, and electrical (hm&e) or installation industrial control systems (ics).
This position is responsible for monitoring compliance with the IA program throughout the organization. Assist with the design, development, implementation, and management of an effective information system security program.
In this role, you will esign, develop, prototype, analyze, and test applications related to satellite systems, distributed computing, data networks, network simulation, and tactical network performance and vulnerability assessment.
In this role, the selected candidate
must have experience with system integration, testing, installation, development and update of technical documentation, accreditation, operation, and maintenance and transition to operations.
In this role, you will provide information assurance support for application development that includes system security certifications and project evaluations for firewalls that encompass the development, design, and implementation.
In this role, you will support facility growth and enhancement through strategic planning, equipment and software selection. Reconfigure facility for new projects and equipment including computer installation, networking, and applications installation.