In this role, the selected candidate will perform the day to day monitoring of security tools such as vulnerability scanners and act as an escalation point for notifications sent by hosting providers or internal teams regarding malware, vulnerabilities, indicators of compromise and other security related incident indicators.
Performs a variety of forensic and electronic discovery services, including digital evidence preservation, forensic analysis, data recovery, tape recovery, electronic mail extraction, and database examination.
In this role, the selected candidate must have experience working with IP networking, networking protocols and understanding of security related technologies including encryption, IPSec, PKI, VPNs, Firewalls, proxy services, DNS, electronic mail and access-lists (ACL).
The candidate will be instrumental in completing efforts at all instances of the product development life cycle to include: concept, design, fabrication, test, installation, operation, maintenance and disposal.
The Database ISSO is responsible to the System Owner (SO) and Information Systems Security Manager (ISSM) or the Chief Security Officer (CSO) for ensuring that an appropriate operational security posture is maintained for an assigned Information System (IS) which will have a significant Oracle Database component.
The successful candidate must have a proven experience with Linux and UNIX and will be able to provide examples of how he or she has used automation to create efficiencies and integrate with APIs to connect tools and enhance functionality.
You'll be part of a world-class team in a fast-paced environment that has the entrepreneurial feel of a start-up. This is an opportunity to operate and engineer systems on a massive scale, and to gain top-notch experience in cloud computing.
Facilitate the exchange of information, techniques, and best practices for promoting software and hardware assurance as part of the DoD systems engineering and system security engineering ( SSE ) processes.
The Information Systems Security Engineer shall perform; or review; technical security assessments of computing environments to identify points of vulnerability; non-compliance with established Information Assurance (lA) standards and regulations; and recommend mitigation strategies.
Responsible for providing technical guidance focused on information security architecture. Performs security research, analysis, and design for assigned client computing systems and the network infrastructure.