In this role, the selected candidate will ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
In this role, you will conduct required information system vulnerability scans according to risk assessment parameters. Initiate protective and corrective measures when a security incident or vulnerability is discovered with ISSM or CSO approval.
In this role, you will support exercises and training through table top exercises or development of TTPs, to include approaches for cyber key terrain identification, and exercise planning, observations, execution, and analysis
In this position, you will provide instruction and SME input to course development on computer network exploitation operations. Provide IT support and maintain systems current by conducting application updates and security patches to increase the security posture.
In this role, the selected candidate will provide technical guidance to software testers to help them embrace change as new test automation tools are introduced; lead key technical testing areas that require expertise beyond functional software testers.
In this role, the selected candidate will have audit functions, including reviewing UNIX and Windows system logs, network monitoring, such as analyzing network traffic for anomalies, inspecting Web application logs, and correlating events across various logging mechanisms.
In this role, you will work closely with the information assurance officer to ensure proper remediation, patching, and information security. Leverage knowledge gathered and experience for current and future audits and inspections.