Yesterday
Secret
IT - Security
Arlington, VA (On-Site/Office)
Immediate Need for the Security Specialist Position in Arlington, VA
Role: Security Specialist
Location: Arlington, VA (onsite 5 days per week)
Duration: Contract to Hire
Citizenship: US Citizen with active Secret Clearance
Top Required Skills
Needs to be able to give intimate detail about STIG's and configuration management specifically, need to have an understanding of STIG's settings within Windows and different operating systems
looking for an experienced professional with experience in building, managing, and controlling the secure configurations of information systems for federal organizations. Your duties will include managing and controlling secure configurations of over 200 information systems for a federal client with a critical and high-profile mission in accordance with NIST 800-128 guidance and applicable federal and organizational policies to enable security and facilitate the management of risk. You will use Security-Focused Configuration Management (SecCM) to build on the general concepts, processes, and activities of configuration management by attention on the implementation and maintenance of the established security requirements of the organization and systems. You will ensure information security configuration management requirements are integrated into (or complement) existing organizational configuration management processes (e.g., business functions, applications, products) and information systems. Additional SecCM duties and activities include:
Identification and recording of configurations that impact the security posture of the system and the organization.
The consideration of security risks in approving the initial configuration.
The analysis of security implications of changes to the system configuration.
Documentation of the approved/implemented changes.
Qualitative and quantitative research to support work assignments for meeting the deliverable objective.
Qualitative and quantitative analyses for assigned tasks.
Compilation of research, findings, and other information into written formats such as white papers, reports, presentations, and other forms of technical
documentation
Participation in policy development for configuration management.
Configuration management planning and management.
Configuration identification.
Configuration management and IT security audits.
Thanks and Regards
Murali Sharma
202.828.3494
Murali@Nastechglobal.com
Role: Security Specialist
Location: Arlington, VA (onsite 5 days per week)
Duration: Contract to Hire
Citizenship: US Citizen with active Secret Clearance
Top Required Skills
Needs to be able to give intimate detail about STIG's and configuration management specifically, need to have an understanding of STIG's settings within Windows and different operating systems
looking for an experienced professional with experience in building, managing, and controlling the secure configurations of information systems for federal organizations. Your duties will include managing and controlling secure configurations of over 200 information systems for a federal client with a critical and high-profile mission in accordance with NIST 800-128 guidance and applicable federal and organizational policies to enable security and facilitate the management of risk. You will use Security-Focused Configuration Management (SecCM) to build on the general concepts, processes, and activities of configuration management by attention on the implementation and maintenance of the established security requirements of the organization and systems. You will ensure information security configuration management requirements are integrated into (or complement) existing organizational configuration management processes (e.g., business functions, applications, products) and information systems. Additional SecCM duties and activities include:
Identification and recording of configurations that impact the security posture of the system and the organization.
The consideration of security risks in approving the initial configuration.
The analysis of security implications of changes to the system configuration.
Documentation of the approved/implemented changes.
Qualitative and quantitative research to support work assignments for meeting the deliverable objective.
Qualitative and quantitative analyses for assigned tasks.
Compilation of research, findings, and other information into written formats such as white papers, reports, presentations, and other forms of technical
documentation
Participation in policy development for configuration management.
Configuration management planning and management.
Configuration identification.
Configuration management and IT security audits.
Thanks and Regards
Murali Sharma
202.828.3494
Murali@Nastechglobal.com
group id: 91142412