Audit new and existing information systems and applications to ensure that appropriate controls exist, that processing is efficient and accurate, and that systems procedures are in compliance with the appropriate standards.

More Uses of the GICSP Toolkit:

  • Initiate: exposure to at least one common code language used by applications developed by your organization.
  • Standardize: cybersecurity analysis with regards to authorization of information systems and all associated cybersecurity policies and procedures.
  • Govern: in a rapidly changing operational technology environment, clients from all industries look to you for trusted solutions for increasingly complex risks and vulnerabilities.
  • Make sure that your organization interfaces with other system support groups to resolve problems, setting standards and improving overall efficiency of the operating system.
  • Make sure that your organization identifies opportunities to enhance and improve systems and processes in support of current and development initiatives and strategies.
  • Have the desire and aptitude for learning and rapidly mastering new applications and technology.
  • Establish that your organization adjusts priorities to respond to pressing and changing demands caused by operational or project situations.
  • Orchestrate: technical training in cybersecurity, information assurance, network design or information technology.
  • Orchestrate: from tackling day to day challenges to solving industry wide problems, you never stop until the job is done.
  • Translate customer qualitative analysis process and goals into quantitative formulations that are coded into software prototypes.
  • Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination.
  • Develop and implement statistical, machine learning, and heuristic techniques to create descriptive, predictive, and prescriptive analytics.
  • Manage work on developmental and operational teams to create and maintain configuration baselines development, test, production, etc.
  • Guide: work to balance workloads, monitor, and support the management of the change, incident, and problem management processes.
  • Lead security strategy development and alignment to business and technology strategies.
  • Confirm your organization evaluates the interface between hardware and software, operational requirements and the characteristics of an overall system.
  • Govern: cybersecurity practitioner with regards to authorization of information systems and all associated cybersecurity policies and procedures.
  • Assure your organization assess change in the system, its environment, and operational needs that could affect the authorization.
  • Arrange that your organization advises hardware designers on machine characteristics that affect software systems as storage capacity, processing speed, and input/output requirements.
  • Arrange that your organization participates in test efforts for software product development or support projects to measure the quality of the functional (business) components of the system.
  • Coordinate: governance gatekeeping for security on lob specific releases and coordination with security architect.
  • Ensure your organization conducts the periodic review of each systems A and A package and monitors corrective actions until all actions are closed.
  • Formulate: there is potential for lots of upward mobility into higher level cyber analysis and incident response level roles.
  • Formulate: research, evaluate, and advise clients regarding new security technologies or control frameworks.
  • Maintain and support technical management processes as Requirements Management, Risk Management, and Configuration Management.


Categories: Articles