In this role, you will perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy.
In this role, the selected candidate will monitor, detect, and take immediate action on events and incidents as they occur on the network; automate analysis activities via scripting and integration of multiple existing tools.
In this role, the selected candidate will configure systems following Department of Defense (DoD) Certification and Accreditation (C&A) guidance and perform C&A assessments to evaluate compliance with established cyber security policies and regulations.
In this role, the candidate will perform daily operations and monitor events from multiple sources including, but not limited to, SIEM consoles, network and host based intrusion detection systems, firewall consoles, system logs (Unix and Windows), applications, databases, and other security information monitoring tools.
In this role, you will administer network security program including event detection, post mortem analysis and recommending process improvements. He / She will also maintain hardware, software and network firewalls and encryption protocols.
In this role, the selected candidate will monitor, audit, secure and protect business critical operational data, systems and processes within these standards while also understanding the business drivers that exist within the enterprise.
In this role, the selected candidate will collaborate with internal IT and Security staff to establish and enforce IT security best practices, information protection objectives, process improvements and effective IT security controls.
In this role, the selected candidate will be working within the threat management team and responsible for examining security events for context, relevance, criticality and their potential impact to the company.