Provide cybersecurity support on a large program providing IT operations support for a globally distributed legacy system, cloud based modernized replacement system, phase in/phase out support from legacy to replacement.

More Uses of the CCISO Toolkit:

  • Be accountable for providing planning, policy, requirements, and integration support for cyber capabilities and identifies opportunities for mission enhancement.
  • Confirm your organization focus is on developing security strategies, plans, policies, and processes for the protection of your organizations critical information and assets.
  • Guide: monitor and evaluate a systems compliance with information technology (it) security, resilience, and dependability requirements across all capabilities using implemented cloud capabilities.
  • Audit: track cyber actions from initial detection through final resolution; analyze and assesses damage to the data / infrastructure, perform cyber engineering trend analysis and reporting.
  • Confirm your organization contributes to the development of intelligence products and performs a vast array of cyberspace intelligence analyst duties with no guidance.
  • Ensure the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints.
  • Support the delivery of the Group cybersecurity Strategy and roadmap development and progress, along with supporting initiatives where applicable to improve overall cybersecurity posture and reduce risk.
  • Evaluate: monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
  • Ensure your organization coordinates with organizations local engineering resources and OEMs for patching, upgrading, or renewing tool and sensor software and hardware.
  • Be accountable for researching, developing requirements, evaluating, testing, and implementing new or improved information security software, devices or systems.
  • Ensure your organization supports decision making and special projects on the preparation, production, and coordination of written products and briefings for stakeholders and leadership.
  • Pilot: management of network designs, installations, implementation of standards, and conversion and migration methodologies to enhance network technologies.
  • Be certain that your organization analyzes information security systems and applications and recommends and develops security measures to protect information against unauthorized modification or loss.
  • Confirm your organization provides status briefs to Project Manager and government leadership for specified engineering projects to ensure requirements are properly defined, understood, and met.
  • Ensure your organization provides security validation of complex engineering analysis and support for firewalls, routers, networks, and operating systems.
  • Confirm your organization provides support to ensure organization processes remain in compliance with security control framework and applicable data privacy regulations.
  • Ensure proper configuration management procedures are followed prior to implementation and contingent upon necessary approval by the government.
  • Assure your organization assesses architecture and current system limitations, defines and designs system specifications, and evaluates input/output processes and working parameters for hardware/software compatibility.
  • Manage: proactively work with cybersecurity architecture team, business units and ecosystem partners to implement practices that meet agreed on policies and standards for information security.
  • Ensure you cloud based system use and securing of operating systems, network infrastructure, software applications, web servers, and databases.
  • Make sure that your organization prepares and modifies requirements to develop cyberspace capabilities based on the changing cyberspace environment for appropriate Government review, validation, and prioritization.
  • Arrange that your organization provides technical expertise for the identification, development and prioritization of cyberspace operations requirements, processes, procedures, and governing directives.
  • Support the pm or iso in maintaining current authorization to operate, and approval to connect, and in implementing corrective actions identified in the plan of action and milestones.
  • Develop system impact analysis based on complex system interactions and the downstream mission impact on a system or platform.
  • Collaborate with technical and threat intelligence analysts to provide indications and warnings, and contribute to predictive analysis of malicious activity.


Categories: Articles