This IT Security Analyst (Awareness and Training) is overall responsible for our security awareness and training program. Ultimately this person's job is to reduce risk to our organization by ensuring all employees, staff and contractors know,understand and follow our security requirements and behave in a secure manner.
The CA shall facilitate planning, execution, and reporting of CAP assessments, CAP data management (collection, processing, and reporting), incorporating common DOT&E processes and methodologies, DoD Architecture Framework (DoDAF) analysis to support CS assessments, mission verification/validation, and vulnerability remediation (VR).
In this role, the selected candidate will provide operational enhancements, maintenance and support for a suite of software products, including, but not limited to: AIX/Unix/Windows based systems that support the TXCSES 2.0 infrastructure applications.
The successful candidate will have hands-on
experience in the IAM space, the IAM product, platform and business processes, the ability to participate in deployments and upgrades, and the desire to work accept challenges.
In this role, the selected candidate will analyze issues, facts and available information to develop logical solutions; researching inconsistencies found in data; drawing correct inferences from information and making recommendations that support business decisions.
This role is responsible for designing, building and tuning log storage solutions that support a variety of security intelligence tools. Testing, monitoring, and alerting of a distributed storage systems.
As an Information Security professional you will be a critical member of the IT Security team directly contributing to projects spanning multiple technical areas, including: cutting edge information security technologies, enterprise level architecture, security frameworks and security incident management.
Consults with all areas of the business, particularly Product Management and Product Development to advise on matters of security. Architects, Implements, Administers and Operates Information Security Systems.
In this role, the selected candidate will identify security issues for remediation and performs system/network STIG implementation and verification, software certificate of netwrothyness verifications, software and hardware management, system integration assitance and patching/auditing through HBSS, SCCM, SCOM, and SPLUNK.