Secure that your organization across your organization, work with IT management, department heads, Internal Audit staff, and others to verify that remediation plans are executed; verify via follow up procedures that remediation plans implemented as planned to strengthen controls and mitigate identified risks.
- Support the customer in the enforcement of the design and implementation of trusted relationships among external systems and architectures.
- Be accountable for offering the technology transformations, strategy, and mission services needed to get the job done.
- Arrange that your organization complies; awareness of the latest network and application hacking techniques and countermeasures (emerging trends).
- Apply project management and system administration expertise in the system administration life cycle, integration, risk management, incident handling, and change management.
- Consult on and lead vulnerability identification, new threat exposures and emerging security technologies.
- Support the development of an Enterprise wide Security Architecture and the design of a security model.
- Ensure knowledge transfer is done through training in the last year as part of transitioning activities.
- Be accountable for inspecting network traffic for non authorized activity or any form of network exploitation and compromise using a variety of network security sensor applications.
- Be accountable for reviewing and assessing all aspects of the customers mission by conducting full packet capture analysis of customer network traffic.
- Evaluate system security plans and procedures, addressing IT out of compliance issues, preparing, implementing, monitoring, and updating project plans.
- Inspect data traffic for non authorized activity or any form of network exploitation and compromise, using a variety of network security sensor applications.
- Identify risks, issues and/or action items related to security, alert the management/executive team to concerns, and help identify and implement resolutions or mitigation approaches.
- Manage work with your team of Cybersecurity experts to find the adversary in the SIEMs blind spot and advise clients on ways to close the gaps and harden network.
- Analyze data traffic inspection results, provide recommended mitigations and present the results.
- Interpret various types of data, analyze results using statistical techniques and provide ongoing reports.
- Provide technical expertise evaluating and interpreting data, analyzing results using statistical techniques.
- Have expert knowledge in successfully conducting exploitation of wireless network and mobile device exploitation operations.
- Support the project administration leader in understanding and enforcing personnel, facility, technology and other security requirements related to providing services.
- Provide expertise of network security testing, server hardening, vulnerability scanning tools and penetration testing techniques.
- Be accountable for running network modeling and configuration compliance/vulnerability scanning tools on computer networks.