Category Archives: Information Assurance Jobs

Remote Work Cyber security Architect

For more on cybersecurity:
http://securitycompliance.thinkific.com

CyberSecurity Architect (remote work)
I would really appreciate if you can give me a call back at my contact # 302-401-6677 Ext- 330.

Job Title Remote position-Information Security Architect
Location Philadelphia PA
Duration 6 months /Contract

JOB DESCRIPTION

Interview Mode-Phone and Skype
Needs USC or GC Only

This role will be able to work remotely but the idea is someone in the Philadelphia area to be able to come in once/week.
If they are further away, it would be less than that.
The manager is open to remote candidates but they need to be in the Eastern Standard Time Zone.

Description:

[Information Security Architect]

Brief description of the role

• Collaborate with Security Architecture and Information Security leadership to help guide the Security Architecture Program
• Collaborate with and influence technology leaders and stakeholders to produce solutions and architectures

Key deliverables but not limited to:

• Interpret Information Security requirements, Policies, and Standards to help ensure delivery of secure IT solutions
• Identify and deliver strategic initiatives that drive revenue and improve efficiency, aligned with business strategy
• Develop technology visions and strategies that support and enhance the business strategy
• Cultivate relationships with business stakeholders and IT leadership
• Communicate architectural plans and strategies
• Develop, communicate, and deploy Enterprise Architecture processes, reference architectures, and technical standards/strategies
• Recommend and arbitrate between technical choices that best serve the enterprise needs and adhere to IT’s guiding principles
• Advocate and practice enterprise architecture as well as security solution architecture best practices
• Develop solutions for the enterprise and business application IT segments
• Create and maintain technology standards, strategies, and roadmaps for the enterprise
• Research and recommend current and future technologies by tracking trends and industry best practice
• Maintain in-depth knowledge of the organizations technologies and architectures
• Contribute to the enterprise technology roadmap
• Evaluate and assess new technologies

Key relationships

• Security Architecture Leadership
• Information Security Leadership team
• Information Technology Leadership and team
• Business technical team

High level skills:

• Change and Adaptability
• Client Focus
• Business Acumen
• Results Focus
• Broad knowledge of Information Security, IT and industry best practices
• 10 + years or equivalent experience
• Excellent written communication and presentation skills

High level technical skills

• Network Security
• Network Hardware Configuration
• Network Protocols
• Networking Standards
• Supervision
• Conceptual Skills
• Decision Making
• Informing Others
• Functional and Technical Skills
• Dependability
• Information Security Policies and Standards

Key Requirements
• Acquire a complete understanding of a company’s technology and information systems
• Plan, research and design robust security architectures for any IT project
• Full understanding of a vulnerability testing, risk analyses and security assessments
• Research security standards, security systems and authentication protocols
• Develop requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related network devices
• Full understanding of public key infrastructures (PKIs), including but not limited to use of certification authorities (CAs) and digital signatures (key management is a must)
• Prepare cost estimates and identify integration issues
• Review and approve installation of firewall, VPN, routers, IDS scanning technologies and servers
• Review final security structures to ensure they behave as expected
• Provide technical supervision for (and guidance to) a security team
• Define, implement and maintain corporate security policies and procedures
• Assist when required to security-related incidents and provide a thorough post-event analysis
• Recommend on update and upgrade security systems as needed
• Understanding of the Cloud security, predominantly Microsoft Azure cloud and Oracle cloud, special security needs for cloud systems

Qualifications:

• CISSP (required)
• CISSP-ISSAP (preferred)
• CEH (optional)
• CISA/CISM (optional)

The 3 main components to this role are:
1) Networking knowledge
2) Security knowledge
3) Writing/Communication

Note: Travel is not required, but could be an option.

diacap tarry town

DIACAP Compliance Engineer and Information Assurance Lead Jobs (risk management framework)

Role: DIACAP Compliance Engineer
Location: Tarrytown, NY
Duration: 6+ months

Enterprise Solution Inc.
500 E. Diehl Road, Suite 130, Naperville, IL 60563
Office: # 630-214-9485
E-Mail : pradyut@enterprisesolutioninc.com
Gmail : pradyut10.esi@gmail.com

Title: Information Assurance Lead
Location: Aberdeen, MD
Client: Federal
Duration: Full Time

Home


8251 Greensboro Drive, 9th Floor

McLean VA 22102
yogeshk@etalentnetwork.com

Office: (877) 715-3865 Ext.328

I get people contacting me every week about jobs all around the US! Today, I am going to show you a couple that I received recently. I hope that it will give you some idea of what employers and contracts look for in security compliance professionals.

diacap tarry town

Job position for DIACAP Compliance Engineer at Tarrytown, NY

Role: DIACAP Compliance Engineer
Location: Tarrytown, NY
Duration: 6+ months

Keywords: – STIG, TFS, DevOps, Windows Imaging WIX, MSI, PowerShell, Anti-Virus, Whitelisting

Job Description:
Background
Source code management (SCM) & DEVOPS team (Infrastructure Team) manages the entire continuous integration, continues development chain process of a global Engineering conglomerate.
Application is developed using Microsoft technology C#, C++, WPF, MVVM and custom control on Windows-7 platform. The backbone of the entire SCM is Microsoft TFS while the packaging strategy is utilizing MSI and WIX. The current build management is driven by customized XMAL with PowerShell usage. Now the plans are to move to VNEXT that provides flexibility as an orchestrator and allows better reporting, triggering and logging facility.
The Goal of this team is to make the entire infrastructure to be in compliant with DIACAP (DoD Information Assurance Certification and Accreditation) process

Expectations – The team is looking out for Engineers who can augment the current team and support on following tasks
This means the identified engineer needs experience in DIACAP process (not knowledge) on how the system could be transformed to be DIACAP compliant system.
• Experienced in the Security Technical Implementation Guide (STIG) that provides security guidance for .NET deployments in workstations or servers and focuses on the secure configuration of the .NET Common Language Runtime (CLR).
• Identify loopholes and open items as part of IIS 7.0 Web Server to ensure that the IIS 7.0 becomes STIG compliant and thus related request handling and filtering are done in control manner and encryption is applied for protocols or data exchange for HTTP, FTP or telnet and more of such tasks etc.
• Ensuring the basic need of McAfee VirusScan 8.8 Managed Client STIG that highly suggests to have antivirus to be monitoring 24*7 along with no possibility of stoppage of such services and availability of antivirus signed files almost every day
• Ensure security enablement in Microsoft Internet Explorer 11 client used on Windows-7 workstations like script execution, popup restrictions as needed and stoppage of unsigned ACTIVEX controls
• Experience in interpreting STIG scans that reflect results on periodic basis.
• Experience in working on adding check and controls in build management system that automates scans ensure STIG compliance.

Soft Skills
• Good Team Player
• Good Written and verbal communication skills
• Customer facing experience would be added advantage

www.enterprisesolutioninc.com Pradyut Bhattacharya
Enterprise Solution Inc.
500 E. Diehl Road, Suite 130, Naperville, IL 60563
Office: # 630-214-9485

Air Force Network Technician location Gunter AFB Montgomery

Full Time Position Immediate Interview Need Network Technician location Gunter AFB Montgomery, AL with Air Force

Conduct network security monitoring and intrusion detection analysis for the NIPRNet and SIPRNet using the AF’s selected IDS/IPS toolset
–  Research NIPR and SIPR defensive cyber operations events to determine the necessity for deeper analysis and conduct an initial assessment of type and extent of intruder activities.
–  Enter event data into mission support systems according to operational procedures and reports through the 33rd operational chain.
–  Record suspicious events, meeting established thresholds, into the operational database for suspicious traffic. Records shall contain sufficient information to stimulate future research of suspicious traffic. The record shall answer the: who, what, where, why and when for this suspicious activity.
–  Provide computer security-related assistance to Air Force field units (example: the Integrated Network Operations and Security Center (INOSC), Base Information Assurance shop) in countering vulnerabilities, minimizing risk, and improving the security posture of AF computer networks and systems within the scope of operational requirements and mission execution.
BASIC QUALIFICATIONS:
–  Intermediate knowledge with one or more of the IDS/IPS systems currently in use by the Department of Defense (DoD), Services, and Agencies (i.e., AF, Navy, Army, DC3, DISA) or Federal Government and intermediate experience in the following areas:
EDUCATION REQUIREMENTS:
–  One or more of the following IAT Level II Certifications (GSEC, Security +, SSCP, CCNA-Security)
–  CND Certification (GCIA, CEH, GCIH).
Thanks & Regards,
Harpal Singh
Technical Recruiter
22nd Century Technologies Inc. (TSCTI)
8(a) / SDB | CMMI level 3 Certified
Help Desk Specialist in Honolulu

Need Help Desk Specialist in Honolulu, HI with US Army

Job title :Help Desk Specialist
Location: Honolulu, HI
Client : US Army
CLEARANCE: SECRET
Description
  • The contractor shall provide service execution to CLIN conversion within two (2) business days.
  • The contractor shall provide service management to EITSMS processing within one (1) business day.
Contractor will implement and operate an IT Infrastructure Library (ITIL)-based service desk to provide the HQ a single assured point of contact for all Automated Data Processing (ADP) hardware, software, and networking problems; for service requests, to include new systems, major modifications to existing systems and entry points for emerging technologies. Also maintains service catalogs, an approved product list, and
a knowledge base for Service Desk operations. Adhere to HQs policy of using Information Technology Requests for all maintenance requests. Documents all users’ trouble calls and coordinates all software maintenance changes with government leads while ensuring project maintenance logs are maintained and reviewed.
Special Qualifications:
  • experience using Microsoft Office tools (Word, PowerPoint, Excel, and Outlook)
  • Security+ Certification
Thanks & Regards,
Kartik Jain
Technical Recruiter
Need Information Systems Security Officer in Herndon, VA

Need Information Systems Security Officer in Herndon, VA

Information Systems Security Officer

Location: Herndon, VA
Duration: 1 year
US Citizenship Required –  Public Trust or Secret Clearance Tier III
Summary• Advises key technical personnel of system regarding design, engineering and compliance requirements
• Advises key stakeholders of security posture and risks associated with the system
• Reviews configurations changes for the system and the impact of changes
• Creates, manages and facilitates NIST based security documentation and controls
• Identifies, manages and facilitates remediation of security weaknesses

Job Responsibilities/ Duties:
• Develop, consult, implement controls and documentation for the security of the system. This includes: outlining system operating environment, overall mission, physical diagrams, hardware and software inventories, configuration management, type of data processed, user organizations, security classifications, operating modes, interconnections to other systems/networks, security personnel, and other associated responsibilities.
• Oversee, develop, improve and maintain the overall security posture of the system; that includes: Information System Security Plans, Risk Ratings, Contingency Plans, Security Assessments, and Contingency Plan Tests and other associated documentation.
• Participate in the development or revision of security controls of the system and local operating procedures that are based upon regulatory, policy and industry requirements.
• Act as a consultant to system owners for the security of the system and system documentation. For example, security incident reports, equipment/software inventories, operating instructions, technical vulnerability reports, and contingency plans
• Provide expertise in classified and unclassified ratings to customers.
• Work closely with technical teams for successful Certification & Accreditation of the system that leads to ATO
• Attend ISSO training courses and sessions as required
• Perform interpretations of monthly vulnerability scan results of assigned systems

Required Training:
Senior Level IT Security Certifications (CCDP, CCNP Security, CISSP, CISM, etc.)
Education/Equivalent Training Required: Bachelor’s Degree or equivalent experience will be evaluated
Unique/Additional /Experience (Position Specifics):
Expert knowledge of FISMA and NIST Special Publications
Experience implementing, assessing and managing security controls for federal IT systems
Expert knowledge of IT security best practices
Expert knowledge of current IT security threats
Broad knowledge of IT technologies and operations
Ability to develop good working relationships with customers, colleagues and other stakeholders.
Excellent verbal and written communication skills
Ability to handle and prioritize multiple simultaneous systems, projects and other assignments.
Experience leading information security teams
Knowledge of HIPAA, FedRAMP, PCI, ISO and other standards
Location(s): District of Columbia (Metro Area),
Department: IT Security
Keywords: Certification and Accreditation, C&A, A&A, SA&A, FISMA, compliance, information assurance, ISSO, AISO, ISO, IASO and ISSM
Comments: US Citizen, US Government Suitability Determination and DoE Q Security Clearance is a Plus

Thanks & Regards,
Kartik Jain
Technical Recruiter