Ensure your organization as part of the Cyber assessments team, provide Cybersecurity scanning and testing services, threat intelligence integration to provide Cybersecurity customers with findings and information that informs the risk management and decision making processes.

  • Apply your technical acumen of Cloud Computing, Cybersecurity, IT infrastructure and services in the development and deployment of enterprise level IT / Security policies, strategies, and plans.
  • Provide architectural / risk based analysis of information assurance / Cybersecurity features and relate existing system to future needs and trends and requirements.
  • Perform independent assessments of selected enterprise and systems architectures, information technologies, mission processing systems, and associated processes.
  • Ensure that the engagement is conducted in a timely and accurate manner and all significant matters have been identified, resolved, a documented in accordance with organization policies and professional standards.
  • Secure that your group develops cloud computing strategies and solutions that provide cloud adoption plans, cloud application design, architecture, development, and management.
  • Make sure that your venture performs computer security incident response activities for a large organization coordinates with other government departments to record and report incidents.
  • Simulate attack to identify vulnerabilities, testing new software to help protect organization data, helping users adhere to new regulations and processes to ensure the network stays safe.
  • Capture and refine information protection requirements to ensure the integration into information systems acquisitions and information system development through purposeful security design or configuration.
  • Gather security operations requirements; map legal, regulatory, organizational and industry requirements against architecture designs, identifying gaps or alternative solutions.
  • Confirm your organization ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
  • Establish that your design performs computer security incident response activities for a large organization, coordinates with other government departments to record and report incidents.
  • Become a innovative and effective at anticipating information security risks and implement new ways to protect organization computer systems and networks.
  • Ensure your organization demonstrates expert level knowledge and skills in the technical, process, organizational, and philosophical aspects of information technology, information security, and information risk management disciplines.
  • Formulate capability and technology demonstrations alternatives utilizing waveform virtualized modems as a validation analysis tool, limited deployments, engineering tests, and other pre transition activities.
  • Coordinate with other engineering professionals to provide Enterprise Services technical implementation support in broad area of technology as compute and storage (Cloud/Private/Hybrid), virtualization.
  • Support level of effort scoping by soliciting relevant information from potential customers in terms of security compliance requirements and system complexity.
  • Confirm your venture performs procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
  • Manage and maintain a smooth operation of servers/desktops/routers/switches while working with network, software, and hardware engineers that are remote and on site.
  • Confirm your planning defines requirements for vulnerability reports, coordinate with stakeholders regarding requirements for automated reports, and ensure execution of reports.
  • Help develop and deploy Identity and Access Management (IAM) solutions to ensure information security aligning with organization security requirements and guidelines.
  • Manage work with an established and growing Government and Education Assurance Consulting team to align business goals, objectives, and requirements with decisions regarding solutions, products, and services.
  • Confirm your enterprise performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
  • Ensure you spearhead; lead initiatives to secure on premises or hybrid/multi cloud solutions by specifying methodologies; implementation and calibration; preparing preventive, detective, and reactive security measures and support documentation.
  • Serve as a technical advisor on key initiatives; Performing horizontal integration planning, and interface with other functional areas, supporting technical solutions that address clients current and future needs.
  • Analyze outputs stemming from exercises for the development, architecture, and infrastructure capabilities of persistent training and test environments.
  • Solidify expertise to conceptualize and develop security solutions to address customers security challenges working with various cloud security solution providers and security and risk teams.

 

Categories: Articles