Implement Risk Management Framework (RMF), through the required government policy (i.e., NISPOM, JSIG, ICD etc.), make recommendations on process tailoring, participate in and document process activities.
Develop, modify, review and provide input for C&A packages for accreditation and re-accreditation by assessing the validity of vulnerabilities identified during formal Government accreditation testing.
Configure systems following Department of Defense (DoD) Certification and Accreditation (C&A) guidance and perform C&A assessments to evaluate compliance with established cyber security policies and regulations.
The Service Asset Configuration Analyst focuses on the overall quality of the Configuration Management Database (CMDB) by ensuring configuration items and relationships are accurate and complete by policing process adherence and data quality against documented standards.
Responsible for application systems security and tools including virus protection, technical asset management, user authentication, and intrusion prevention and detection. Acts as a contributor in defining system security and functionality for other business system applications. Conducts vulnerability threat assessments on existing and planned application systems and develops action plans to mitigate security gaps.
The role is responsible for supporting Oracle EBS R12 financial modules in a high-tech semiconductor fabless manufacturing solution, including Accounts Receivable, EBTax, SLA, Accounts Payable, General Ledger and related inventory intercompany transactions.
Decompose system specifications to determine security/IA requirements and work with systems engineers, developers, and other security personnel to develop management and operational procedures, when required, to meet those requirements.
Develop Computer Security education and awareness, perform security reviews and inspections of classified computers systems and networks, security incident investigations, and assisting team members, auditors and system administrators with current system security requirements.
As an Information Security professional you will be a critical member of the IT Security team directly contributing to projects spanning multiple technical areas, including: cutting edge information security technologies, enterprise level architecture, security frameworks and security incident management.