Provide cybersecurity support on a large program providing IT operations support for a globally distributed legacy system, cloud based modernized replacement system, phase in/phase out support from legacy to replacement.
More Uses of the CCISO Toolkit:
- Be accountable for providing planning, policy, requirements, and integration support for cyber capabilities and identifies opportunities for mission enhancement.
- Confirm your organization focus is on developing security strategies, plans, policies, and processes for the protection of your organizations critical information and assets.
- Guide: monitor and evaluate a systems compliance with information technology (it) security, resilience, and dependability requirements across all capabilities using implemented cloud capabilities.
- Audit: track cyber actions from initial detection through final resolution; analyze and assesses damage to the data / infrastructure, perform cyber engineering trend analysis and reporting.
- Confirm your organization contributes to the development of intelligence products and performs a vast array of cyberspace intelligence analyst duties with no guidance.
- Ensure the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints.
- Support the delivery of the Group cybersecurity Strategy and roadmap development and progress, along with supporting initiatives where applicable to improve overall cybersecurity posture and reduce risk.
- Evaluate: monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
- Ensure your organization coordinates with organizations local engineering resources and OEMs for patching, upgrading, or renewing tool and sensor software and hardware.
- Be accountable for researching, developing requirements, evaluating, testing, and implementing new or improved information security software, devices or systems.
- Ensure your organization supports decision making and special projects on the preparation, production, and coordination of written products and briefings for stakeholders and leadership.
- Pilot: management of network designs, installations, implementation of standards, and conversion and migration methodologies to enhance network technologies.
- Be certain that your organization analyzes information security systems and applications and recommends and develops security measures to protect information against unauthorized modification or loss.
- Confirm your organization provides status briefs to Project Manager and government leadership for specified engineering projects to ensure requirements are properly defined, understood, and met.
- Ensure your organization provides security validation of complex engineering analysis and support for firewalls, routers, networks, and operating systems.
- Confirm your organization provides support to ensure organization processes remain in compliance with security control framework and applicable data privacy regulations.
- Ensure proper configuration management procedures are followed prior to implementation and contingent upon necessary approval by the government.
- Assure your organization assesses architecture and current system limitations, defines and designs system specifications, and evaluates input/output processes and working parameters for hardware/software compatibility.
- Manage: proactively work with cybersecurity architecture team, business units and ecosystem partners to implement practices that meet agreed on policies and standards for information security.
- Ensure you cloud based system use and securing of operating systems, network infrastructure, software applications, web servers, and databases.
- Make sure that your organization prepares and modifies requirements to develop cyberspace capabilities based on the changing cyberspace environment for appropriate Government review, validation, and prioritization.
- Arrange that your organization provides technical expertise for the identification, development and prioritization of cyberspace operations requirements, processes, procedures, and governing directives.
- Support the pm or iso in maintaining current authorization to operate, and approval to connect, and in implementing corrective actions identified in the plan of action and milestones.
- Develop system impact analysis based on complex system interactions and the downstream mission impact on a system or platform.
- Collaborate with technical and threat intelligence analysts to provide indications and warnings, and contribute to predictive analysis of malicious activity.