Nov 5
Public Trust
Unspecified
Unspecified
Bethesda, MD (On-Site/Office)
Job Details
Manages the creation of cyber-intelligence tools / methods and oversees the research and analysis of cyber security risks. Manages the design and development of acceptance criteria for cyber security architecture.
• Manages the resolution of cyber security issues related to architectures, firewalls, electronic data traffic, and network access.
• Develops, publishes and enforces company information security standards and guidelines encompassing data and intellectual security.
• Manages the development of appropriate electronic and hard copy reports and records, including new or revised electronic or hard copy documentation. Makes internal and external presentations as needed.
• Overall responsibility for leading the program, department, or functional area as designated. Oversees, directs, and mentors subordinate staff; communicates job expectations and enforces organizational policies, procedures and core values; responsible for recruiting staff, approving timecards, and conducting performance reviews and disciplinary measures.
• Participates with the client in the strategic design process to translate security and business requirements in to technical designs.
• Builds and maintains working relationships with team members, vendors, client, and other departments involved in the project.
• Manages a team of cyber security analysts. Supervisory responsibilities include: hiring, firing, and performance management.
• Responsible for ensuring all laws, regulations, and other applicable obligations are observed wherever and whenever business is conducted on behalf of the Company. Responsible for ensuring work is accomplished in a safe manner in accordance with established operating procedures and practices.
• Represents the company as a knowledgeable resource on data security. Acts as primary contact for data security systems and processes.
Minimum Qualifications
• Bachelor's Degree in Information Assurance, Computer Science, or related field.
• 6-8 years of experience with 2-5 years of management experience
Other Job Specific Skills
• Must have experience writing policy, performing vulnerability testing and operating system hardening along with demonstrated leadership skills including organizing, planning, scheduling and coordinating workloads to meet established deadlines.
• Familiarity with security industry standards (ISO 17799, NIST 800 series, etc.)
• Experience with internal controls, risk assessments, business process and internal IT control testing or operational auditing.
• Demonstrated ability to write business and technical reports and to participate in presentations.
• Possess a thorough understanding of technical interface requirements and processes.
• Strong interpersonal skills to effectively interface with all levels of employees, management and outside representatives.
• Ability to resolve complex and diverse technical and management issues.
• Must demonstrate a detailed and comprehensive knowledge and understanding of data security principles, theories, regulations and practices.
#CJPOST
Job Requirements:
Manages the creation of cyber-intelligence tools / methods and oversees the research and analysis of cyber security risks. Manages the design and development of acceptance criteria for cyber security architecture.
• Manages the resolution of cyber security issues related to architectures, firewalls, electronic data traffic, and network access.
• Develops, publishes and enforces company information security standards and guidelines encompassing data and intellectual security.
• Manages the development of appropriate electronic and hard copy reports and records, including new or revised electronic or hard copy documentation. Makes internal and external presentations as needed.
• Overall responsibility for leading the program, department, or functional area as designated. Oversees, directs, and mentors subordinate staff; communicates job expectations and enforces organizational policies, procedures and core values; responsible for recruiting staff, approving timecards, and conducting performance reviews and disciplinary measures.
• Participates with the client in the strategic design process to translate security and business requirements in to technical designs.
• Builds and maintains working relationships with team members, vendors, client, and other departments involved in the project.
• Manages a team of cyber security analysts. Supervisory responsibilities include: hiring, firing, and performance management.
• Responsible for ensuring all laws, regulations, and other applicable obligations are observed wherever and whenever business is conducted on behalf of the Company. Responsible for ensuring work is accomplished in a safe manner in accordance with established operating procedures and practices.
• Represents the company as a knowledgeable resource on data security. Acts as primary contact for data security systems and processes.
Minimum Qualifications
• Bachelor's Degree in Information Assurance, Computer Science, or related field.
• 6-8 years of experience with 2-5 years of management experience
Other Job Specific Skills
• Must have experience writing policy, performing vulnerability testing and operating system hardening along with demonstrated leadership skills including organizing, planning, scheduling and coordinating workloads to meet established deadlines.
• Familiarity with security industry standards (ISO 17799, NIST 800 series, etc.)
• Experience with internal controls, risk assessments, business process and internal IT control testing or operational auditing.
• Demonstrated ability to write business and technical reports and to participate in presentations.
• Possess a thorough understanding of technical interface requirements and processes.
• Strong interpersonal skills to effectively interface with all levels of employees, management and outside representatives.
• Ability to resolve complex and diverse technical and management issues.
• Must demonstrate a detailed and comprehensive knowledge and understanding of data security principles, theories, regulations and practices.
#CJPOST
Job Requirements:
- Assess security systems by monitoring security environment
- Perform security risk assessments to determine level of security services
- Transform security specifications into cost-effective information security solutions
- Implement security best practice controls for SAP security solution, interface security, communication security
- Maintain enterprise security risk management program
- Lead and facilitate detailed system security vulnerability assessments
- Facilitate control system security risk assessments
- Improving application security or on mobile device and mobile application security
- Resolving security and compliance issues
- Resolve security incidents and recommend enhancements to improve security
- Interpret security policy and standards
- Implement and support information security solutions
- Formulating security policies and procedures
- Conducting system security and vulnerability analyzes and risk assessments
- Assist in investigation of network/infrastructure/application security alerts from managed security service provider and in-house security tools
- Delivering end-user security training
- Help lead security to protect network infrastructure
- Lead client-related information security audits
- Providing oversight of security projects
- Enhance clients' security posture
group id: 10238000