Support an integrated, dynamic Cyber defense and leverage Cybersecurity solutions to deliver Cybersecurity operational services, including intrusion detection and prevention, situational awareness of network intrusions, security events, and data spillage, and incident response actions.
The Security Policy Analyst analyzes business requirements and processes by conducting data gathering to understand strengths and weaknesses of security processes, procedures, and policies and determine opportunities for improvement.
The Security Analyst analyzes business requirements and processes by conducting data gathering to understand strengths and weaknesses of security processes, procedures, and policies and determine opportunities for improvement.
Must possess expert knowledge in two or more of the following areas: Vulnerability Assessment, Intrusion Prevention and Detection, Access Control and Authorization, Policy Enforcement, Application Security, Protocol Analysis, Firewall Management, Incident Response, Encryption, Web?filtering, Advanced Threat Protection.
Provide expert cybersecurity knowledge of enterprise mobility systems to business and technology teams and facilitates the collaborative development of the security of the mobile technology strategy, standards, roadmaps, and practices.
This position is responsible for ensuring that ICMA-RC's application landscape is secured. You will work with the development teams to ensure the implementation of appropriate security governance (policy, procedures, baselines and monitoring); assess current controls and residual risk for appropriateness, and test compliance of policies, procedures and monitoring.
Plan and continuously monitor Cybersecurity and privacy policies, programs, and compliance artifacts or standards in support of government and industry security compliance, systems accreditation, and management.
Must be able to multi-task and work independently on moderate to complex assignments using independent professional discretion and judgment as well as transition quickly between projects with minimal supervision.
Define and validate security tests, certifications, and evaluations of applications and general support systems processing sensitive and/ or confidential information as defined by PBS and the NIST Risk Management Framework.
Provides advanced application support and guidance to end users and provides technical guidance to less experienced personnel. Serves as a point of contact for application problems. Assesses problems and identify resolutions.