With a wide range of knowledge, performs independent assessment of the information security posture of an organization using applicable tools. Assesses information network threats such as computer viruses. Operates vulnerability assessment equipment in support of penetration analyses. Provides guidance to less experienced information security professionals. Prepares evaluation reports. Recommends remedial action.
Monitors security systems, and analyzes potential threats and vulnerabilities to client systems.
Develops new computer and network security systems, including both hardware and software.
Coordinates technical incident response and remediation activities for client environments.
Provides security analysis and consultation services for product, system and network architecture designs.
Develops tools for operational use and analyzes current threats to information security and systems.
Analyzes network traffic and alerts to assess, prioritize and differentiate between potential intrusion attempts and false alarms.
Launches and tracks investigations to resolution.
Composes and sends alert notifications.
Analyzes security findings and data.
Publishes reports and keeps metrics for client systems.
Identifies trends and root causes of system failures or vulnerabilities.
Maintains vendor and trusted partner relationships.
Ensures that the Information Systems Security department's policies, procedures, and practices as well as other systems user groups are in compliance.
Ensures that the physical environment of the computers and their terminals are properly secured.
EDUCATION & EXPERIENCE:
Typically requires a bachelor's degree or equivalent experience and two to four years of related information security or cyber security experience.
Must have a Department of Defense (DoD) Directive 8570, Information Assurance Management (IAM) Level 2 certification or higher.
Must have Two (2) years of recent experience with demonstrated ability to:
-- Prepare accreditation documentation and artifacts for Certification and Accreditation (C&A)
-- Successfully secure IT systems
-- Supervise, test, and monitor changes in information systems that might affect the security posture
-- Apply software patches
-- Develop and execute System Test and Evaluation (ST&E) plans
-- Prepare IT Security plans
-- Ensure Information Assurance Vulnerability Management Compliance
-- Ensure assigned IA controls are properly implemented
Must have an active interim or final DoD Top Secret clearance with successful SSBI within the past 5 years.
Normal demands associated with an office environment. Ability to work on computer for long periods, and communicate with individuals by telephone, email and face to face. Some travel may be required.