In this role, the selected candidate must have experience in the areas of Information Systems Security Management, Risk Management, Information Security Training /Auditing, Network Administration and /or Incident and violations reporting.
In this role, the selected candidate must have expertise and experience in performing security assessment of network devices (router, switch, firewall configuration), servers, workstations, Web applications and databases.
In this role, you will provide Information Assurance (IA) support to a large federal client. Function as an IA network security subject matter expert and provide Assessment and Authorization (A&A) support.
This position is responsible for monitoring compliance with the IA program throughout the organization. Assist with the design, development, implementation, and management of an effective information system security program.
In this role, you will perform vulnerability analysis and assessment using either government or commercial off-the-shelf technologies. Performs a variety of routine project tasks applied to specialized technology problems.
In this role, you will require one to work across multiple global organizations and service providers in order to effectively monitor for suspicious activity as well as make recommendations to improve the security posture and protect the discovery communication brand.
In this role, the selected candidate will collaborate with all internal security teams and vendors to implement security controls; maintain active understanding of industry practices for threat analytics and incident response.
In this role, the selected candidate must have knowledge Managers, Telecommunication Network Engineers (w/ Optical experience), Budget/Finance Analyst, Configuration Managers, Technical Writers, IP Network Engineers, Optical Transport Engineers, Test & Evaluation Engineers, and Systems Engineers.
In this role, the selected candidate
must have experience with system integration, testing, installation, development and update of technical documentation, accreditation, operation, and maintenance and transition to operations.
In this role, the successful candidate will develop and maintain automated information technology security monitoring and reporting mechanisms; develops and maintains various network security control systems such as firewalls, intrusion detection/protection systems, wireless networks, remote access, proxy servers, anti-virus solutions, and network account access.
In this role, you will support exercises and training through table top exercises or development of TTPs, to include approaches for cyber key terrain identification, and exercise planning, observations, execution, and analysis
In this role, you will provide sustainment support for HBSS (McAfee 5.X) systems and support selection, integration, testing and deployment of next generation endpoint (PC, virtual and mobile devices). solution that includes Anti-virus, whitelisting, virtual containment, malware detection, incident response and asset management capabilities.
In this role, the selected candidate estimates the size of the effort required to complete the solutions based on requirements in order to ensure that management understands the timeframe and effort required.
In this role, you will perform cyber risk assessment and solution engineering for critical infrastructure systems (e.G., hull, mechanical, and electrical (hm&e) or installation industrial control systems (ics).
The Security Engineer implements and provides technical support for enterprise client security and identity management solutions; work with the Help Desk and other IT service areas to resolve issues and enhance services.