Category Archives: cyberspace workforce

Remote Work Cyber security Architect

For more on cybersecurity:
http://securitycompliance.thinkific.com

CyberSecurity Architect (remote work)
I would really appreciate if you can give me a call back at my contact # 302-401-6677 Ext- 330.

Job Title Remote position-Information Security Architect
Location Philadelphia PA
Duration 6 months /Contract

JOB DESCRIPTION

Interview Mode-Phone and Skype
Needs USC or GC Only

This role will be able to work remotely but the idea is someone in the Philadelphia area to be able to come in once/week.
If they are further away, it would be less than that.
The manager is open to remote candidates but they need to be in the Eastern Standard Time Zone.

Description:

[Information Security Architect]

Brief description of the role

• Collaborate with Security Architecture and Information Security leadership to help guide the Security Architecture Program
• Collaborate with and influence technology leaders and stakeholders to produce solutions and architectures

Key deliverables but not limited to:

• Interpret Information Security requirements, Policies, and Standards to help ensure delivery of secure IT solutions
• Identify and deliver strategic initiatives that drive revenue and improve efficiency, aligned with business strategy
• Develop technology visions and strategies that support and enhance the business strategy
• Cultivate relationships with business stakeholders and IT leadership
• Communicate architectural plans and strategies
• Develop, communicate, and deploy Enterprise Architecture processes, reference architectures, and technical standards/strategies
• Recommend and arbitrate between technical choices that best serve the enterprise needs and adhere to IT’s guiding principles
• Advocate and practice enterprise architecture as well as security solution architecture best practices
• Develop solutions for the enterprise and business application IT segments
• Create and maintain technology standards, strategies, and roadmaps for the enterprise
• Research and recommend current and future technologies by tracking trends and industry best practice
• Maintain in-depth knowledge of the organizations technologies and architectures
• Contribute to the enterprise technology roadmap
• Evaluate and assess new technologies

Key relationships

• Security Architecture Leadership
• Information Security Leadership team
• Information Technology Leadership and team
• Business technical team

High level skills:

• Change and Adaptability
• Client Focus
• Business Acumen
• Results Focus
• Broad knowledge of Information Security, IT and industry best practices
• 10 + years or equivalent experience
• Excellent written communication and presentation skills

High level technical skills

• Network Security
• Network Hardware Configuration
• Network Protocols
• Networking Standards
• Supervision
• Conceptual Skills
• Decision Making
• Informing Others
• Functional and Technical Skills
• Dependability
• Information Security Policies and Standards

Key Requirements
• Acquire a complete understanding of a company’s technology and information systems
• Plan, research and design robust security architectures for any IT project
• Full understanding of a vulnerability testing, risk analyses and security assessments
• Research security standards, security systems and authentication protocols
• Develop requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related network devices
• Full understanding of public key infrastructures (PKIs), including but not limited to use of certification authorities (CAs) and digital signatures (key management is a must)
• Prepare cost estimates and identify integration issues
• Review and approve installation of firewall, VPN, routers, IDS scanning technologies and servers
• Review final security structures to ensure they behave as expected
• Provide technical supervision for (and guidance to) a security team
• Define, implement and maintain corporate security policies and procedures
• Assist when required to security-related incidents and provide a thorough post-event analysis
• Recommend on update and upgrade security systems as needed
• Understanding of the Cloud security, predominantly Microsoft Azure cloud and Oracle cloud, special security needs for cloud systems

Qualifications:

• CISSP (required)
• CISSP-ISSAP (preferred)
• CEH (optional)
• CISA/CISM (optional)

The 3 main components to this role are:
1) Networking knowledge
2) Security knowledge
3) Writing/Communication

Note: Travel is not required, but could be an option.

6 Figure IT Security

6 Figures in IT Security “cybersecurity” (Do you Want this? If so, sign up here)

Course site: https://securitycompliance.thinkific.com

I am thinking of doing a course on how to make 6 figures in IT Security. What do you think? Is this something you would be interested in? This is something I know a lot about.

I would explain:
The landscape of IT Security
Career paths in IT Security
How to choose the right path
How to prepare for that path
What kinds of IT security jobs make 6 figures
What places and companies pay 6 figures
What certifications, degrees and experience you need to start
How to build a bad ass IT security resume
where to post it
how to respond once offers start coming in

IT security position job Q&A (part 1)

Check out my FREE courses at: https://securitycompliance.thinkific.com

In this video we read some of your questions about getting IT Security Jobs.

masaki23joe
“I have a B.A in Telecommunications, would this work for this career field.” see the answer at 00:00:45

shawn 08
“Hey Bruce I got my security + and cap. What do you suggest on how to get into the risk management/ security auditing field when someone doesn’t have any experience? I do have 7 years experience in desktop support and data center monitoring just want to try a different field but not sure how to go about this.”
answer at 00:02:53

David petrell
“What training is need to get into the security field? I have a BS in information security and working a MS in Cybersecurity and working on getting my CEH cert. What are ways that I can get into the security field as I don’t have any security experience and most jobs postings are wanting at least 4 to 5 years of experience”
answer at 00:06:26

diacap tarry town

Job position for DIACAP Compliance Engineer at Tarrytown, NY

Role: DIACAP Compliance Engineer
Location: Tarrytown, NY
Duration: 6+ months

Keywords: – STIG, TFS, DevOps, Windows Imaging WIX, MSI, PowerShell, Anti-Virus, Whitelisting

Job Description:
Background
Source code management (SCM) & DEVOPS team (Infrastructure Team) manages the entire continuous integration, continues development chain process of a global Engineering conglomerate.
Application is developed using Microsoft technology C#, C++, WPF, MVVM and custom control on Windows-7 platform. The backbone of the entire SCM is Microsoft TFS while the packaging strategy is utilizing MSI and WIX. The current build management is driven by customized XMAL with PowerShell usage. Now the plans are to move to VNEXT that provides flexibility as an orchestrator and allows better reporting, triggering and logging facility.
The Goal of this team is to make the entire infrastructure to be in compliant with DIACAP (DoD Information Assurance Certification and Accreditation) process

Expectations – The team is looking out for Engineers who can augment the current team and support on following tasks
This means the identified engineer needs experience in DIACAP process (not knowledge) on how the system could be transformed to be DIACAP compliant system.
• Experienced in the Security Technical Implementation Guide (STIG) that provides security guidance for .NET deployments in workstations or servers and focuses on the secure configuration of the .NET Common Language Runtime (CLR).
• Identify loopholes and open items as part of IIS 7.0 Web Server to ensure that the IIS 7.0 becomes STIG compliant and thus related request handling and filtering are done in control manner and encryption is applied for protocols or data exchange for HTTP, FTP or telnet and more of such tasks etc.
• Ensuring the basic need of McAfee VirusScan 8.8 Managed Client STIG that highly suggests to have antivirus to be monitoring 24*7 along with no possibility of stoppage of such services and availability of antivirus signed files almost every day
• Ensure security enablement in Microsoft Internet Explorer 11 client used on Windows-7 workstations like script execution, popup restrictions as needed and stoppage of unsigned ACTIVEX controls
• Experience in interpreting STIG scans that reflect results on periodic basis.
• Experience in working on adding check and controls in build management system that automates scans ensure STIG compliance.

Soft Skills
• Good Team Player
• Good Written and verbal communication skills
• Customer facing experience would be added advantage

www.enterprisesolutioninc.com Pradyut Bhattacharya
Enterprise Solution Inc.
500 E. Diehl Road, Suite 130, Naperville, IL 60563
Office: # 630-214-9485

3_NIST SP 800-37 (rev 2) changes

NIST 800 37 Revision 2 – RMF for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy

NIST 800 37 Revision 2 Risk Management Framework for Information Systems and Organizations A System

Download the presentation in this Video & Learn more here:

http://securitycompliance.thinktific.com

This is an overview of NIST 800-37 Revision 2. I discuss the changes, the sources and Cybersecurity Framework.

NIST Special Publication 800-37, Revision 2
Risk Management Framework for Security and Privacy
Initial Public Draft: May 2018
Final Public Draft: July 2018
Final Publication: October 2018

NIST 37-800 Rev 2:
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r1.pdf

Executive Order:
https://www.whitehouse.gov/presidential-actions/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure/

OMB:
https://www.whitehouse.gov/sites/whitehouse.gov/files/omb/memoranda/2017/M-17-25.pdf

Cybersecurity Framework:
https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf

NIST SP 800-53 (Revision 5):
https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/draft

Source of Changes:
President’s Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Office of Management and Budget Memorandum M-17-25 – next-generation Risk Management Framework (RMF) for systems and organizations
NIST SP 800-53 Revision 5 Coordination

Monterey Bay Aquarium Backview

Cyber security Engineer in Monterey CA

This is Nicholas associated with 22nd Century Technologies, Inc.,(TSCTI) assessed at CMMI Level 3 is one of fastest growing IT services and solutions company with innovative approach to provide IT services and solutions to Federal, State, Local agencies and commercial clients. Incorporated in 1997, TSCTI has its corporate headquartered in New Jersey and has presence in 33 other states across the U.S including Public sector practice headquarter in DC Metro area. Find more about us at www.tscti.com
We have a position for you to work as Cyber security Engineer in Monterey CA. Please review below the full job and let us know if interested I will love to call you as per your convenience and would discuss this position in detail so that we can go ahead and submit your resume.
Please send me the updated copy of your detailed resume.
You can reach me at 908-765-0002 ext. 307 for any questions, I’m available today till 6 PM EST
Title:                                     Cyber security Engineer
Location:                             Monterey, CA
Duration:                             Full Time
Client:                                  Defense Language Institute
Certification : Security+
Duties may include:
•             Support an Information Systems Security, Education, Training, and Awareness Program.
•             support implementation and enforcement of Information Security Policies and Procedures.
•             Review and update all Information Systems Security Plans/SSPs and support certification and accreditation efforts.
•             Provide technical support in the areas of vulnerability assessment, risk assessment, and security implementation.
Technical Skills:
HBSS
ACAS
STIG
Retina, MacAfee
DIACAP
Thanks & Regards,
Nicholas Johnson
Team Lead