Information System Security Experience to include:
Extensive work experience and knowledge in; network monitoring, and intrusion detection using host-based and network- based intrusion detection systems (IDS) and log management applications; testing, installing, patching, and upgrading computer hardware and operating systems (Windows, and UNIX) in an enterprise environment; identifying, collecting, processing, documenting, reporting, cyber security/ incident response events; architecting, engineering, developing and implementing cyber security/incident response policies and procedures; engineering, testing, installing, patching, and upgrading various information security hardware and software applications, to include but not limited to, SourceFire, Arcsight, Splunk, NetWitness, Guidance Software,Digital Guardian, Raytheon (SureView), NMAP, Metasploit, Request Tracker, Nagios , Intelliview, Nessus, and Foundstone; information system security, cyber security, computer forensics, vulnerability assessment and penetration testing, malware analysis, insider threat, information certification & accreditation regulations, Federal Information Security Management Act (FISMA), National Institute of Standards and Technology (NIST), and American Society of Crime Laboratory Directors (ASCLD).
Provides support on all information security activities at the program level including policy development, compliance inspections, audits, reviews and communications security.
Provides support and works on the development phases of information security systems development lifecycle.
Conducts assessments of threats and vulnerabilities, determines deviations from acceptable configurations, enterprise or local policy, assesses the level of risk, and develops and/or recommends appropriate mitigation countermeasures in operational and non-operational situations.
Documents incident correlation requirements selects incident correlation engines and recommends configuration guidelines. Performs analysis to determine the optimum configuration of network and host sensors.
This analysis includes traffic load analysis, performance impacts of monitoring, determination of potential attack characteristics based on mission and infrastructure, and determination of site-specific data collection requirements.
Analyzes and recommends resolution of information security problems based on knowledge of the major information security products and services, an understanding of their limitations, and a working knowledge of the disciplines of information security.
Must have a degree from an accredited college or university in computer science, information systems analysis, science / technology, information management, computer engineering, or electrical/electronic engineering.