Design and implement information assurance and security engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management).
The position will support the onsite Cyber/IA Security Lead implementing and improving technology and procedures related to vulnerability management, device hardening, and cyber security incident response.
Develop and implement proactive IT security measures and practices to protect customer systems from exploit specifically focused on firewalls, external access control points, and vulnerability assessment/mitigation.
In this role, you will assist the Government to Generate and maintain security documentation for system hardware and software, to include System Security Plans, equipment lists, practices and procedures.
Design, test, and implement secure operating systems, networks, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions.
In this role, the selected candidate will perform the day to day monitoring of security tools such as vulnerability scanners and act as an escalation point for notifications sent by hosting providers or internal teams regarding malware, vulnerabilities, indicators of compromise and other security related incident indicators.
Responsible for providing technical guidance focused on information security architecture. Performs security research, analysis, and design for assigned client computing systems and the network infrastructure.
Analyze available security information including results of configuration compliance verification; vulnerability assessment, database assessments; security and system patch information; field reports; OIG reports, and intelligence information to assess the status of remote organizations cyber security posture.
In this role, the selected candidate must have experience working with IP networking, networking protocols and understanding of security related technologies including encryption, IPSec, PKI, VPNs, Firewalls, proxy services, DNS, electronic mail and access-lists (ACL).
In this role, you will perform and review technical security assessments of computing environments to identify points of vulnerability, non-compliance with established information assurance (ia) standards and regulations, and recommend mitigation strategies.
Perform and review technical security assessments of computing environments to identify points of vulnerability, non-compliance with established information assurance (ia) standards and regulations, and recommend mitigation strategies.