In this role, the selected candidate must have experience in the areas of Information Systems Security Management, Risk Management, Information Security Training /Auditing, Network Administration and /or Incident and violations reporting.
In this role, you will perform vulnerability analysis and assessment using either government or commercial off-the-shelf technologies. Performs a variety of routine project tasks applied to specialized technology problems.
In this role, the selected candidate will collaborate with all internal security teams and vendors to implement security controls; maintain active understanding of industry practices for threat analytics and incident response.
In this role, the selected candidate must have expertise and experience in performing security assessment of network devices (router, switch, firewall configuration), servers, workstations, Web applications and databases.
In this role, you will support exercises and training through table top exercises or development of TTPs, to include approaches for cyber key terrain identification, and exercise planning, observations, execution, and analysis
The Cyber Security Configuration Engineer will provide technical expertise for evaluating a wide array of new and emerging technologies, and developing recommendations for security configuration baselines.
In this role, the selected candidate
must have experience with system integration, testing, installation, development and update of technical documentation, accreditation, operation, and maintenance and transition to operations.
In this role, you will direct and perform cloud security and information systems engineering analysis for testing, assessing, evaluating, integrating, and enforcing requirements of Cybersecurity or IA products and tools to coordinate assessment and acquisition.
The ideal candidate will have enterprise cyber security and compliance experience and be able to work as a member of a team supporting a high-visibility customer. The candidate should have some familiarity with U.S. Federal cyber security and compliance regulations and guidance. The candidate will focus on executing and monitoring cyber security capabilities to protect client sensitive information and systems.