In this role, you will develop and maintain a formal IS security program and policies for classified systems under their purview. The selected candidate will
provide oversight and guidance ensuring systems are properly configured, optimized, and tested ensuring all policy and technical requirements are met.
Manage and administer all security aspects for multiple programs, including implementing physical, program, facility and information security requirements to ensure compliance with NISPOM, DCIDs, ICDs, federal security regulations and information security requirements.
In this role, you will be responsible for authoring system's security documentation and identify potential security weaknesses and vulnerabilities, and recommending implementation of security controls to mitigate vulnerabilities and to reduce overall system risk. The selected candidate will be expert in configuration and security hardening of Windows and Linux based systems.
In this role, you will determines resources available to support enforcement of security processes in conformance with applicable information security policies, standards, procedures and controls. Identifies information security opportunities and recommends process or technology enhancements.
The individual will need to be able to document and communicate effectively with customers and internal teams, assist in the investigation of events and follow-up with corrective actions and reporting.
Design, test, and implement secure operating systems, networks, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions.
The ideal candidate will serve as the subject-matter expert in such areas as network security, switching, and routing; this individual maintains the current network infrastructure of the company and develops new network architecture to position the company for further growth.