In this role, you will manage Cyber Team with responsibility for personnel actions, performance evaluations, tasking assignments, quality assurance and quality control of deliverable, mentoring as needed.
In this role, you will document security on both new and fielded information systems and/or provide accreditation/certification evaluation and test support to ensure all technical security features are considered and functioning properly.
In this role, you will manage a security team responsible for the protection of information for a government information system. Work with and advise government and contractor resources on security and technical requirements and implementations.
In this role, the selected candidate must have experience with conducting application threat modeling, security risk assessments, security control assessments, and vulnerability assessments using Open Source and commercial tools and manual methods.
In this role, you will work with team members to provide advice and assistance to facilitate certification and accreditation efforts. Strong oral/written communication and customer interface skills a necessity.
In this role, the selected candidate will be responsible for implement, deploy, and operate the infrastructure hardware and software which are required to effectively manage the organizations Cybersecurity operational services.
The Senior Information Security Engineer is responsible for the planning, implementation and auditing of security systems, policies and procedures which safeguard the integrity of and access to applications, tools, and electronic information in order to guard information against accidental or unauthorized modification, destruction, or disclosure.
In this role, you will provide support for Information Security requests: Review security policy clarifications and exception requests; lead Security projects; triage general security questions from other internal teams.
In this role, you will analyze and respond to Cyber events and incidents within information systems and networks and support continuous monitoring and ongoing authorizations of IT infrastructure services programs and projects.
In this role, the selected candidate will analyze and control Internet egress, including web content filtering and host-level access control methods; threat modeling network intrusion scenarios and designing monitoring / alerting mechanisms to detect abuse.
In this role, you will ensure proper access controls are implemented for both system access and physical access to data processing facilities. The selected candidate will create, update and assess compliance of system Authority to Operate packages.
The ideal candidate will have cyber security incident response and forensics experience in a production environment with both physical and virtual systems. The candidate should be very familiar with U.S. Federal cyber security and compliance regulations and guidance as these relate to cyber security incident response and forensic investigation.
In this role, you will administer and maintain network routers, switches, remote access servers, network services, and management systems. The selected candidate will also proactively monitor the internal and external network and recommend and implement improvements.