Vacancy expired!
- Conducts information systems security programs that involve access to computers and computerized data to meet requirements for network security through firewalls and intrusion detection systems.
- Conducts regular audits to ensure that systems are operating securely, and that information systems security policies and procedures are being implemented as defined in security plans.
- Develops, evaluates, and operates firewalls, intrusion detection systems, enterprise anti-virus systems, and software deployment tools.
- Safeguards the network against unauthorized infiltration, modification, destruction, or disclosure.
- Researches, evaluates, tests, communicates, and implements new security software or devices.
- Implements, enforces, communicates, and develops security policies or plans for data, software applications, hardware, telecommunications, and information systems security education/awareness programs.
- Conducts routine investigations of information systems security violations and incidents, reporting as necessary to management.
- Responds to queries and requests for computer security information and reports.
- Highly proficient in application of professional concepts in accordance with STG policies and procedures to resolve intermediate to advanced analysis/programming issues.
- Works under some supervision but also expected to utilize independent judgment and initiative. Work is reviewed for soundness of technical judgment, overall adequacy, and accuracy.
- Provides solutions to a variety of technical problems of moderate scope and complexity.
- Accurately estimates deadlines and readjusts duties as needed. Avoids last-minute crunches.
- Keeps manager and team members informed and participates actively within the team by sharing information.
- Displays self-confidence and shows strong initiative.
- Demonstrates well-developed communication skills.
- Assists in providing technical guidance to less senior technical staff.
- Interacts closely with managers, colleagues, and customers.
- Structures logical documents and writes sections that require only minor editing.
- Explains and presents good ideas frequently, effectively, and with confidence.
- Other duties assigned.
- MA/MS +10 yrs. OR
- BS/BA + 12 yrs.
- To include IA/ IT Security experience
- IASAE II (CAP, CASP, CISM or GSLC)
- Ability to see and read computer screens, concentrate for long periods, and remain in a sedentary position. Requires sitting for long periods. Ability to communicate via computer and telephone.
- Desired Skills: Under general supervision, assists in the support of Certification and Accreditation (C&A) or other IA/CND Compliance and Auditing processes and inspections for all enterprise systems and networks; assists in the development of all associated documentation.
- Assists in the compliance reviews of computer security plans, performs risk assessments, and assists in security test evaluations and audits. Analyzes security requirements for information protection for enterprise systems and networks. Professionally certified as Technical Level I as defined by DODI 8570 is a requirement.
Vacancy expired!