Cybersecurity Specialist with Security Clearance Law Enforcement & Security - San Antonio, TX at Geebo

Cybersecurity Specialist with Security Clearance

Excentium, Incis a Service-Disabled Veteran owned small business that provides Cyber Security Engineering, Information Assurance (IA), management, Certification and Accreditation (C&A), and other IT services to government and commercial organizationsWe have an opportunity for a Cybersecurity Specialist to support one of our Federal customersMINIMUM CLEARANCE LEVEL:
Top Secret CITIZENSHIP:
US Citizenship LOCATION:
Remote The Cybersecurity Specialist determines enterprise information assurance and security standardsDevelops and implements information assurance/security standards and proceduresCoordinates, develops, and evaluates security programs for an organizationThey will provide recommendations for information assurance/security solutions to support the customers' requirementsIdentifies, reports, and resolves security violationsEstablishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demandsThe position will be supporting the customers at the highest levels in the development and implementation of doctrine and policiesApply know-how to government and commercial common user systems, as well as to dedicated special purpose systems, requiring specialized security features and proceduresMay direct or perform analysis, design, and development of security features for system architecturesAnalyzes and defines security requirements for computer systems which may include mainframes, workstations, and personal computersDesigns, develops, engineers, and implements solutions that meet security requirements Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problemsMay direct or Perform vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycleReview and ensure compliance with Department of Defense (DoD) and Defense Health Agency policy and requirementsDesigns, develops, and implements solutions to meet security requirementsGathers and organizes technical information about an organization's mission goals and needs, existing security products, and ongoing programs in computer securityParticipates in all phases of the systems lifecycle including preliminary and final design, systems development, integration, and testing
Responsibilities:
o Develop/maintain processes that implement the DoD Security program.
o Regularly Audit network/IT environment for compliance to Policy and associated SOP - Weekly/Daily reporting of internal high-risk systems, outstanding remediation and mitigation activities,o Assist in development of Plan of Action and Milestones (POA&M) and compliance.
o Assist with POA&M management, mitigation statement formulation, interfacing with system administrators to resolve open findings of high- and at-risk systems.
o Coordinate with the Computer Network Defense Service Provider (CNDSP) to provide incident support for cyber security incidents.
o Support Validation of IT security architecture for compliance.
o Assist in compliance reporting for the Information Assurance Vulnerability Management (IAVM) program.
o Conduct Incident Response and forensic analysis when necessaryo Assist in management of the assessment/authorization program for HIT information systems.
o Ensure compliance with DHA RMF policies and procedures.
o Maintains the electronic registration of systems in eMASS, DITPR, or other Portfolio as directed.
o Coordinates with stakeholders to communicate status and action items for systems in processo Updates documentation as system information changeso Coordinates Annual Reviewso Supports/Performs assessment of NIST 800-53 controlso Coordinate with Threat Management Branch for Technical Assessmento Perform Vulnerability scanning and remediation Required Education:
o BS/BA preferred in Computer Science or related field of study (can be substituted for 5 years professional experience)o IAT Level II Certification Required Skills:
o Minimum 5 years' experience within Cyber Security fieldo Understanding DOD STIGs and ability to provide direction based on STIGso Familiarity Risk Management Framework (RMF)o Must be Capable of independent management of projects.
o Able to work in team environments and independentlyo Ability to write procedures and other informative correspondenceo Ability to read, analyze and interpret security regulationso Good analytical and problem-solving skills to troubleshoot and resolve network/operating system security issueso Knowledge of eMASS We take pride in building a workforce with a strong Veterans focus Excentium offers a competitive salary and comprehensive benefits package, including medical, dental, life, disability, 401k, and paid time offExcentium, Incis an equal opportunity employer Recommended Skills Analytical Architecture Auditing Computer Security Forensic Sciences It Service Management Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.