Identify and implement appropriate information security architectures and functionality to ensure organizations aligns with best practice security policy and enterprise solutions.

  • Use network and host based tools to monitor and detect potential threats and unauthorized activity across Windows, Unix, cloud, and mobile devices.
  • Be accountable for coordinating security rules and internal access authorization with operations leadership and management.
  • Ensure you support; lead the is engineering and manage delivery of security solutions supporting various is initiatives.
  • Be accountable for performing analysis of log files from a variety of sources to identify possible threats to computer security.
  • Be accountable for using leading edge technology and industry standard forensic tools and procedures to provide insight into the cause and effect of suspected Cyber intrusions.
  • Confirm your organization supports customers at the highest levels in the development and implementation of doctrine and policies.
  • Be accountable for creating forensically sound duplicates of evidence (forensic image) to use for data recovery and analysis.
  • Collaborate with configurations management to develop and maintain authorized software lists for all types of on premises and cloud systems assigned.
  • Ensure you orchestrate; lead process community reporting, conduct link analysis, and collaborate with other Government Cyber fusion teams.
  • Establish that your design provides incident response capabilities to isolate and mitigate threats to maintain confidentiality, integrity, and availability for protected data.
  • Be accountable for determining programs that have been executed, finding files that have been changed on disk and in memory.
  • Be accountable for supporting the detection, containment, and eradication of APT activities targeting customer networks.
  • Manage work with client management and Human Resources to ensure appropriate and consistent corrective action.
  • Be accountable for safeguarding the network against unauthorized infiltration, modification, destruction, or disclosure.
  • Oversee information security incidents, coordinate the response and communicate the remediation efforts to all involved business partners.
  • Determine the root cause of incidents and work with business or technology groups to remediate any identified control gaps or failures.
  • Be accountable for tracking and documenting on site incident response activities to provide updates to leadership throughout the engagement.
  • Utilize hacking and penetration testing techniques to target mobile apps and web services to test security.
  • Arrange that your corporation complies;
  • Perform forensic and memory analysis on Windows, Unix, Mobile, and Cloud devices and infrastructure.
  • Support the priorities planned and organized by the Security architecture in accordance with the roadmap for security architecture.
  • Support the planning and conducting of Cybersecurity exercises as tabletop exercises for programs and applications.
  • Support the development of an Enterprise wide Security Architecture and the design of a security model.

 

Categories: Articles