Secure that your organization across your organization, work with IT management, department heads, Internal Audit staff, and others to verify that remediation plans are executed; verify via follow up procedures that remediation plans implemented as planned to strengthen controls and mitigate identified risks.

  • Support the customer in the enforcement of the design and implementation of trusted relationships among external systems and architectures.
  • Be accountable for offering the technology transformations, strategy, and mission services needed to get the job done.
  • Arrange that your organization complies; awareness of the latest network and application hacking techniques and countermeasures (emerging trends).
  • Apply project management and system administration expertise in the system administration life cycle, integration, risk management, incident handling, and change management.
  • Consult on and lead vulnerability identification, new threat exposures and emerging security technologies.
  • Support the development of an Enterprise wide Security Architecture and the design of a security model.
  • Ensure knowledge transfer is done through training in the last year as part of transitioning activities.
  • Be accountable for inspecting network traffic for non authorized activity or any form of network exploitation and compromise using a variety of network security sensor applications.
  • Be accountable for reviewing and assessing all aspects of the customers mission by conducting full packet capture analysis of customer network traffic.
  • Evaluate system security plans and procedures, addressing IT out of compliance issues, preparing, implementing, monitoring, and updating project plans.
  • Inspect data traffic for non authorized activity or any form of network exploitation and compromise, using a variety of network security sensor applications.
  • Identify risks, issues and/or action items related to security, alert the management/executive team to concerns, and help identify and implement resolutions or mitigation approaches.
  • Manage work with your team of Cybersecurity experts to find the adversary in the SIEMs blind spot and advise clients on ways to close the gaps and harden network.
  • Analyze data traffic inspection results, provide recommended mitigations and present the results.
  • Interpret various types of data, analyze results using statistical techniques and provide ongoing reports.
  • Provide technical expertise evaluating and interpreting data, analyzing results using statistical techniques.
  • Have expert knowledge in successfully conducting exploitation of wireless network and mobile device exploitation operations.
  • Support the project administration leader in understanding and enforcing personnel, facility, technology and other security requirements related to providing services.
  • Provide expertise of network security testing, server hardening, vulnerability scanning tools and penetration testing techniques.
  • Be accountable for running network modeling and configuration compliance/vulnerability scanning tools on computer networks.

 

Categories: Articles