Description of Position:
Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies.
Validates and verifies system security requirements definitions and analysis and establishes system security designs.
Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements.
Builds IA into systems deployed to operational environments.
Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions. Supports the building of security architectures.
Enforce the design and implementation of trusted relations among external systems and architectures.
Assesses and mitigates system security threats/risks throughout the program life cycle.
Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations.
Reviewing security architectures, firewall configurations, IDS/IPS, and security controls for new and proposed systems.
Prevention and early detection and resolution of risks to high value assets.
Development and management of strategic and tactical physical, personnel and procedural security programs.
Architect, design, implement, support, and evaluate security-focused tools and services including project leadership roles.
Providing software vulnerability remediation advice to software developers and software development teams.
Implementing security vulnerability testing tools to provide continuous monitoring and patch verification.
Test and evaluate products in a lab environment.
Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content.
Provide input into the development of security policies and procedures.
Provide detailed security recommendations for the secure development and maintenance of systems.
Evaluate and recommend new and emerging security products and technologies.
Provide security operations support as needed.
Participate in projects that develop new intellectual property.
Evangelize security within the organization and be an advocate for customer trust.
Education and Experience Required: