In this role, you will perform analysis on logs produced by network devices utilized within the OCC such as firewalls, content filtering, syslog from various sources/devices, assorted Intrusion Detection capabilities, substantiating vulnerability scanner results, directory services, DHCP logs, Secure Email Gateway logs, and approved OCC applications.
In this role, you will provide technical engineering services for the support of integrated security systems and solutions and interface with the client in the strategic design process to translate security and business requirements into technical designs.
As part of the Security Team, the position is responsible for implementing, operating, and managing security requirements both technical and administrative on classified system and unclassified systems.
In this role, the selected candidate will be responsible for drafting the initial SSIAP and coordinating and collaborating with the site ISSM/IAO until all lA supporting documentation is satisfactory and meets the requirements laid out in the AOC WS Service Level Agreement.
The Successful candidate shall be responsible for overall compliance, identification of anomalies and coordination with Signature Management personnel to develop custom host-based signatures to automate the detection of events of interest.
In this role, you will establish complex operational software configuration controls and system interfaces for computer system(s) assigned. He / She will also analyze and troubleshoot system anomalies to ensure optimum equipment performance.
In this role, the selected candidate will be studying, analyzing, developing, and implementing cybersecurity initiatives and policies to improve the quality, timeliness, and efficiency of cybersecurity processes.
In this role, the selected candidate will ensure and maintain IAVA and STIG compliance and review all change requirements of the systems; perform assessments of new technologies being implemented at the various stages of the Systems Engineering Lifecycle.
In this role, you will design, develop, and coordinate the implementation of solutions that meet security requirements. The selected candidate will also provide integration and implementation of the computer system security solution.