Search for More Jobs
Forward job to a friend
Apply without Registering
Apply by creating/using an account
Please enter your registered email address, and we'll email you a link to reset your password right away.
Must be a US Citizen who currently possesses a Secret Clearance.
The successful candidate will maintain Cybersecurity risk identification, assessment, and evaluation across the UC enterprise regarding changes, controls, and anticipated threats.
Assess the possible vulnerabilities and threats and determine the resulting risks, likelihoods, and impacts.
Determine risk remediation, including compensating controls, work to incorporate or reject controls and determine residual risks, and interface between Government risk managers, and subcontractor risk management for risk acceptance.
Leverage knowledge of security threats, system, including application and infrastructure vulnerabilities, resulting risks, and compensating controls. Participate in process improvement activities, including standardizing threat actors and control catalogs.
Leverage knowledge utilizing the following areas: Cyber defense capabilities, including Cyber threat intelligence/operations, vulnerability management, incident response, security analytics, attack surface reduction, penetration testing, and red teaming
Ensures the rigorous application of cybersecurity policies, principles, and practices in the delivery of all Information Technology (IT) and cybersecurity services
Develops and designs security solutions to maintain confidentiality, integrity, and availability of information throughout the enterprise
Identifies, plans, and documents improvements to security controls currently in place
Develops and documents recommendations and courses of action (COAs) to solve complex cybersecurity problems
Develops and interprets cybersecurity requirements as part of the IT acquisition development process and assists in the formulation of cybersecurity/IT budgets
Plans and schedules the installation of new or modified security hardware, operating systems, and software applications
Ensures the assessment and implementation of identified computer and network environment fixes such as system patches and fixes associated with specific technical vulnerabilities as part of the Cybersecurity Vulnerability Management program
Guides the implementation of appropriate operational structures and processes to ensure an effective cybersecurity program, including boundary defense, incident detection, and response.
Possesses an in-depth understanding and the ability to apply intermediate concepts of cybersecurity
Maintains in-depth knowledge and understanding of the DOD cybersecurity policies and the Risk Management Framework
With no guidance, conducts cybersecurity research and analysis, provides recommendations for the implementation of security mechanisms, and provides educational briefings on the recommended cybersecurity mechanism
Contributes substantive content to the development of cybersecurity documentation, concept papers, as required by DoD and Army policies and the Risk Management Framework
With no guidance, evaluates functional operation and performance in light of test results and makes recommendations regarding C&A
Required Experience, Education, and Certifications:
Minimum 10 years of experience with cybersecurity and information assurance
Minimum of Bachelor's Degree in a technical or business discipline from an accredited college or university in Computer Science, Cybersecurity, Computer Engineering, or related discipline
Minimum DOD 8140/DOD 8570 IAM Level II Certification
Strong attention to detail and organizational skills. Excellent communications skills.
Apply by creating/using an account