Independently perform complex security analyses of classified and unclassified applications, systems, and enclaves to verify compliance with security requirements.
Apply a broad set of security techniques, technologies, and tools to assess security posture in highly complex computer systems and networks.
Perform vulnerability and risk analyses and participate in computer security penetration studies to identify and remediate security gaps.
Analyze and define security requirements for computer and networking systems, including mainframes, workstations, and personal computers; recommend practical solutions to meet security requirements.
Gather, organize, and interpret technical information about an organization’s mission goals and needs; translate findings into actionable security improvements.
Provide enterprise-wide technical analysis and direction for problem definition, analysis, and remediation of complex systems and enclaves.
Deliver actionable recommendations and advice to client executive management on system improvements, optimization, and ongoing maintenance across areas, including:
Information Systems Architecture
Automation, Telecommunications, and Networking
Communication Protocols
Application Software
Electronic Email, VOIP, and Video Teleconferencing (VTC)
Demonstrate competence across all phases of information systems auditing, from planning and scoping to evidence collection, testing, reporting, and follow-up.
Prepare clear, concise audit reports and executive summaries with prioritized remediation plans and realistic timelines.
Collaborate with cross-functional teams (IT, security, operations, and management) to implement and validate corrective actions.
Stay current with evolving cybersecurity threats, controls, standards, and regulatory requirements to maintain audit readiness.
Requirements
Seven years of IT experience.
Five years of IA (Information Assurance) experience.
Strong analytical and problem-solving skills for resolving security issues.
Strong skills in implementing and configuring networks and network components.
Demonstrated proficiency in performing CCRI, vulnerability assessments, and penetration testing on networks, databases, computer applications, and IT frameworks.
Command Cyber Readiness Inspection (CCRI) experience in at least one of the following areas: