As the cyber threat landscape is evolving , c y bersecurity solutions are deployed in large, complex networked environments. The resource requires specialized skill sets to provide guidance at various stages of planning and implementing security design, processes and solutions, and pivot between numerous technical projects communicating status at various leadership levels. The resource will have significant interaction with Cyber Command leadership, its engineering and architecture teams, incident response and other cyber security practitioners.
TASKS: - Lead the implementation of cybersecurity initiatives
- Perform organization - wide cybersecurity risk analysis and maintain updates on the identified risks
- Create, socialize and obtain approval for cybersecurity strategy and plans to address generic and specific cybersecurity risks to the organization
- Create and follow a process to track progress against cybersecurity plans
- Create network architecture diagrams, collect communication flow information, and build high level and low level design documents
- Work on complex network problems, interact with vendor support teams, and drive the issue to resolution
- Translate compliance requirements into specific security controls and present compensating security controls
- Report to upper management on current cybersecurity posture and progress on mitigating identified risks
- Identify cybersecurity gaps and maintain a risk register
- Create metrics to measure cybersecurity controls efficacy
- Work with partners to create and maintain incident response plans
- Monitor and respond to alerts
- Review and optimize existing cybersecurity controls
- Ensure the organization compliance with cybersecurity best practices, policies and standards
- Enforce endpoint security standards
- Analyze vulnerabilities and work with Application Development, IT and Systems teams to ensure timely remediation and validation
- Perform threat simulations to detect possible risks and provide cybersecurity recommendations on topics like network perimeter, identity management, API security, microservices design and /or application development
- Instruct and guide other teams to craft "secure by default " infrastructure; they may also investigate, build, and recommend innovative technologies or other methods that will improve the security of cloud-based and on-premises environments
SKILLS/EXPERIENCE - Bachelor's degree in Computer Science, Information Systems or equivalent work experience
- At least 12+ years of experience in information security
- At least 8+ years in IT infrastructure management, application architecture, risk management, data architecture, middleware technology, and IT operations and project management
- At least 8+ years of experience with networking, load-balancing, DNS, TLS/SSL digital certificates, SAML, Kerberos, MFA technologies, and Identity management
- At least 4+ years of experience working in cloud environment (Azure, AWS, GCP)
- At least 4+ years of experience working in securing Internet-facing applications, utilizing WAF technologies (eg: Akamai CDN and WAF, CloudFlare, Azure CDN and WAF, AWS CloudFront and WAF)
- At least 4+ years of experience working tools and techniques for collecting and processing Network Security Telemetry and Security Event Data.
- At least 4+ years of experience architecting, deploying, and managing endpoint security and EDR technology
- At least 4+ years of experience using scripting languages (Python, Bash, Powershell, etc.)
- At least 4+ years of experience with Windows, Linux, or MacOS administration
- At least 4+ years of experience working with vulnerability management and scanning tools
•
Last updated on Jul 28, 2023