Maintain a database to track findings, vulnerabilities, and best practice procedures and remedies to be followed by software development teams in correcting deficiencies identified during information assurance vulnerability compliance testing/scanning.

More Uses of the GSLC Toolkit:

  • Identify: research, develop, and implement security plans and policies associated with your organizations communications and other business systems.
  • Evaluate: research, evaluate, and drive next generation security technologies and concepts to keep security ahead of the curve.
  • Drive: review system/system related initiatives for architectural sufficiency and identify any issues to the security management.
  • Be certain that your organization partners with enterprise security governance, risk, and compliance team to assess and reduce cloud security risks.
  • Ensure your organization analyzes new and complex project related problems and creates innovative solutions involving finance, scheduling, technology, methodology, tools, and solution components.
  • Be knowledgeable of technological trends and developments in the area of information security and risk management.
  • Support and management of server virtualization, server provisioning, physical server maintenance, security compliance and daily operations.
  • Determine security requirements by evaluating business strategies and requirements, applying security policies and security best practices.
  • Manage the internal relationships with Cyber Engineers and Information Technology (IT) process owners to maintain project momentum and completion.
  • Maintain the virtualized server environment via configuration, implementation, management and support activities.
  • Evaluate the categorization and implementation of security controls pertinent to information and information systems.
  • Audit: conduct regular audits to ensure proper security policy implementation, safeguard classified materials and provide guidance to program personnel.
  • Get it done successfully deliver end to end projects/capabilities working through a wide range of challenges and opportunities across multiple organizations.
  • Head: continuously improve and advance your organizations operation security capabilities, focusing on process and procedures.
  • Be accountable for analyzing and remediating weaknesses while working with system administrators and other personnel in your organization to implement risk mitigation.
  • Become capable of delivering large, highly complex projects, often involving the coordination of activities of other business units in your organization.
  • Establish: periodically conducts a complete review of each systems audits and monitors corrective actions until all actions are closed.
  • Provide accurate technical evaluations of the software application, system, or network and documenting the security posture, capabilities, and vulnerabilities against applicable NIST controls.
  • Evaluate and find the most efficient way to protect the system, networks, software, data and information systems against any potential attacks.
  • Develop and deliver awareness training to enhance embedded cybersecurity knowledge and skill throughout your organization.
  • Establish multi cloud cybersecurity architecture with a focus on proactive threat detection, security control enforcement and incident response.
  • Be certain that your organization executes a wide range of process activities beginning with the initial technical response to an order through development, test and final delivery.
  • Be accountable for documenting preliminary or residual security risks for system operation and manage and approve Authorization Packages.
  • Support the research of emerging technology, requisite security requirements, and emerging threats and develop a way forward to meet organizational goals.
  • Ensure you network; lead the development of operational security controls, procedures and tools to defend people and assets against current and emerging security threats/risks.


Categories: Articles