Principal Technical Security Risk Cyber Security Analyst

Industry: Professional, Scientific & Technical Services

  •  

8 - 10 years

Posted 34 days ago

This job is no longer available.

Principal Technical Security Risk Cyber Security Analyst (Job Number:444486)

Description:



JOB DESCRIPTION:
- The Principal Cyber Security Risk Management / Technical Security Analyst reports to the Information Technology Office (ITO) BE Cyber Security Manager within the Cyber Assurance (CA) Directorate’s Business Engagement (BE) division.
- The position exercises significant self-starting initiative, analysis and adjudicative risk -based analysis judgment in working with IT and Business Development/ Market Segment teams within the environment.
- The analyst serves as the Cyber Security point of contact in support of the internal and external business customer’s IT portfolio of projects, supplier security evaluations, participate in analysis of alternative workshops and security consultation with regards to company policies and security good practices.
- In addition to primary responsibilities identified below, the Principal Cyber Technical Security Risk Management Analyst will serve as a subject matter expert for network, server, data base management and endpoint technical security requirements, assessing risk, promoting standards and guidelines in information assurance / data management systems.

Produce the following quality deliverables for SAIC business leadership:
- Written reports and verbal presentations.
- Present security recommendations for complex programs & sourcing decisions.
- Perform system security evaluations on suppliers and vendor products by following prescribed security evaluation criteria.
- Provide input to regularly scheduled platform and project specific meetings.
- Produce quality system security risk assessment reports.
- Overall assistance in defining security requirements and strategies for information management system and network architecture design, optimization, and solution delivery.
- Assist platform owners and design teams in applying the necessary security controls to mitigate associated risks.
- Function as a technical functional analyst who can navigate and communicate effectively with both technical and engineering teams and at ease with business function leads.
- Assist in evaluating third- party supplier security controls, third-party relationship management, and Security outsourcing background.
- Using Security Management Practices and internal policy.
- Conduct risk analysis on existing and to-be web/application/information services.
- Document and present findings.
- Apply threat-modeling concepts.
- Serve as a security subject matter expert, providing multi- disciplinary knowledge, skills, and experience in technical information assurance and information security management network security and system architecture and database management.
- Consult on current and upcoming projects covering all levels of network architecture and information management systems impact to the overall IT security and IT systems architecture.
- Provide security-profiling analysis for a wide range of network security technologies including, but not limited to: firewalls, IPS/IDS, NAC, VPN, proxies, routers, and switches.
- Experience securing common services (i.e. DHCP, DNS, Terminal, VM environments, and Open System Software (OSS), WINS, Routing, etc).
- Working knowledge of protocols, network topologies, and perimeter security devices (proxies, IPS, IDS, Firewall and packet analyzers), network security design, and Rights Management Services
• Ensure appropriate security provisioning during varying phases of Software Development Life Cycle and Open System Software (OSS).
- Review business requirements and document security requirements for the information systems, Bids and Proposal life cycle, RFPs, Project Management lifecycle, etc.
- Ensure system changes and updates remain ITO security policy compliant and identify business requirement based policy gaps and alternative architecture / engineering solutions.
- Ensure security standards are applied from RFP/Bid documentation design to UAT.
- Assist in conducting on-site physical security assessments.
- Conduct security risk assessment of supplier (3rd party vendors) and provide recommendations for improving the vendor assessment process.
- Support all facets of the Cyber security program, including the evaluation of vendors, development of recommendations to improve security and mitigate security risks.

Qualifications:


REQUIRED EDUCATION:

- Bachelors in Information Systems, Computer Science, Information Security or related IT field and nine (9) years or more experience.
- Masters and seven (7) years or more experience.
- PhD or JD and four (4) years or more experience.

REQUIRED EXPERIENCE:
- 8- 10 years relevant risk assessment, information security / analytical experience.
- Experience in the use of Service Now or service request ticketing systems, and MS Word , Excel, Power Point and SharePoint.
- Experience using eGRC, SEIM, and Vulnerability Scanning tools.
- Excellent written and oral communication skills.
- Experience in the use of MS Project, MS, Visio, SCCM,FIM/ MIM VMware SDDC and other Microsoft products, ServiceNow, Archer and SPLUNK eGRC /SEIMs and other MVM / Nessus, and other security tools to manage the service requests SIARRAs work Queue and other URLs , AoVPNs, NAC exceptions service request / exception management intake points.
- Experience or training in the IA governance , technical hardening and / or accreditation & certification frameworks and Information Security program Security Plans, STIGS, Center Internet Security baselines for Networking ,OSes, Application and Database components, NIST standards for Risk Management and Cybersecurity frameworks specifically.
- Experience in the use of Service Now or service request ticketing systems, and MS Word , Excel, Power Point and SharePoint.
- Experience using eGRC, SEIM, and Vulnerability Scanning tools.
- Excellent written and oral communication skills.
- Experience in the use of MS Project, MS, Visio, SCCM,FIM/ MIM VMware SDDC and other Microsoft products, ServiceNow, Archer and SPLUNK eGRC /SEIMs and other MVM / Nessus, and other security tools to manage the service requests SIARRAs work Queue and other URLs , AoVPNs, NAC exceptions service request / exception management intake points.
- This requires having an in-depth working experience with an Information Security Risk Assessment using industry standard approach.
- Experience or training in the IA governance , technical hardening and / or accreditation & certification frameworks and Information Security program Security Plans, STIGS, Center Internet Security baselines for Networking ,OSes, Application and Database components, NIST standards for Risk Management and Cybersecurity frameworks specifically.

REQUIRED QUALIFICATIONS:
- Self –starting, independent and innovative process and deliverable oriented contributor and leader who develops work products for Cyber Security and Business Engagement Risk Management and overall BE team to deliver quality risk assessment reports.
- Fundamental technical knowledge of Active Directory, Windows and Linux OSes, VMWare, SDDC and Virtual firewalls, networks, Oracle, SQL, stored procedures, scripts and reports.
- Expertise with NIST and ISO 27000 series, particularly NIST SP 800-53, NIST SP 800-171 r1, ISO 27001/2. Working knowledge of Security Standards/Controls specified under various IT governance and compliance models (NIST, ISO 27001&27002, ITIL, SOX, and DFARS/FARS).
- This includes: Applications and Systems Development Security, Security Management Practices, Access Control, Security Architecture and Modeling, Telecommunications, Network Security, Cryptography (PKI), Operations Security, and Physical Security Controls.
- Demonstrate success leading and conducting senior level security risk analysis.
- Specifically, threat modeling involving system decomposition, threat and vulnerability discovery and mitigation.
- Experience acting as a Subject Matter Expert or team lead providing guidance to others.
- Strong communication skills; person in this role must be able to successfully communicate with management personnel, technical personnel and third parties.
- Professional Security Industry Certifications such as CISSP, CCNA, CCIE or other relevant industry certifications through such accrediting bodies such as the DoD, ISC2, ISACA, SANS or Comp TIA.
- Proven ability to work with cross-functional teams.
- Self-starter, individual contributor; must perform with limited or no supervision.
- Possesses proven initiative and developed listening skills.
- Demonstrate timely task completion involving solid organizational skills, task tracking, and follow-up, and productive peer interaction.
- Possess strong technical writing, verbal and presentation skills especially with communicating to PMOs / senior management.
- Provide feedback on internal processes required to help train and mentor other professionals as needed.
- Worked with Secure Development Life Cycle and Work experience in a mature risk management team with proven risk assessment methodology.

DESIRED SKILLS:
- Experience with NIST SPs for SSPs, DFARs, Encryption and other International security and regulatory standards.
- Project Management Skills.
- Experience with reviewing systems vulnerabilities for risk and relevance.
- Experience in planning mitigations for systems vulnerabilities.
- Extensive understanding of IAM technologies, concepts, policies, processes, best practices, and solutions.
- Knowledge of technology trends and developments in the areas of IAM, and knowledge and experience with formal security and control frameworks such as ISO 17799, COSO, ITIL, and NIST SP 800-53.
- Ensure requirements gathered, processes defined, and use cases documented follow out of the box configuration vs. customization for relevant IAM technologies as much as possible.
- Participate Design deployment architectures.
- Participate in capacity planning and HW / SW specification recommendation efforts.
- Participate in all technology deployment activities ranging from design to architecture to configuration and custom development.
- Participate in and/or lead User Acceptance Testing and bug-related engineering efforts.
- Design, implement and educate on code deployment, code migration, and source control use.
- Provide knowledge transfer and postproduction support activities as necessary.
- Comprehensive understanding of Data Protection solutions and technologies including.
- Data Loss Prevention (DLP), data masking, tokenization, data classification, and data encryption.

SAIC Overview:SAIC is a premier technology integrator providing full life cycle services and solutions in the technical, engineering, intelligence, and enterprise information technology markets. SAIC is Redefining Ingenuity through its deep customer and domain knowledge to enable the delivery of systems engineering and integration offerings for large, complex projects. SAIC's approximately 15,000 employees are driven by integrity and mission focus to serve customers in the U.S. federal government. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $4.5 billion. For more information, visit saic.com. For information on the benefits SAIC offers, see My SAIC Benefits. EOE AA M/F/Vet/Disability

Job Posting: Feb 15, 2019, 10:49:19 AM
Primary Location: United States-FL-ORLANDO
Clearance Level Must Currently Possess: None
Clearance Level Must Be Able to Obtain: None
Potential for Teleworking: No
Travel: Yes, 25% of the time
Shift: Day Job
Schedule: Full-time