Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
Responsible for developing and implementing security engineering processes and procedures in cloud architectures. Familiar with continuous security monitoring and tools.
Cyber Security/Computer and Network Defense Expert
Concentrates on overall technical and operational effectiveness of capabilities
Provides recommendation on continuous improvement of the processes and architecture supporting the overall Cyber Defense operational activities including, but not limited to, analysis, incident handling and reporting products, and the reporting lifecycle
Ensures effective operation of IT systems and network defenses
Provides effective incident response capabilities, usable and effective reports that address overall situational awareness
Maximizes the use of tools to correlate information and synthesize data into usable and actionable events
Identifies and provides an agile approach to the automation of any manual or inefficient processes that exist across the cyber defense program
Recommends and implements technical solutions designed to return time to mission
Determines application and infrastructure security requirements by evaluating business strategies and system requirements; conducts system security and vulnerability analyses and risk assessments; studies application architecture platforms to identify potential integration issues
Recommends security standards and ensures compliance through system monitoring, audits, and implementing compensating controls where appropriate
Monitors, evaluates, and maintains systems and procedures to safeguard internal systems, network, and applications
Monitors, evaluates, and continuously improves the organization by being a trusted advisor, facilitator and creative problem solver.
Implements continuous improvements to the security organization and the program management process
Reports, investigates and resolves security incidents in conjunction with global security operations
10+ years of experience
Possess working knowledge and demonstrated experience of Assessment and Authorization practices with Risk Management Framework (RMF), CNSSI 1253, NIST SP 800-53, and NISPOM
Possess working knowledge and demonstrated experience with Information Assurance Vulnerability Alerts (IAVAs)
Demonstrated experience supporting annual FISMA, IC Scorecard, NIST 800-53, ICD 502 and ICD 503 guidance and other yearly ad-hoc IT financial control audits
Possess working knowledge and demonstrated experience with Security Technical Implementation Guides (STIGs) and Security Content Automation Protocol (SCAP) Compliance Checker (SCC)
Knowledge of data security administration principles, methods, and techniques
Familiarity with domain structures, user authentication, and digital signatures