• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

dod

Information System Security Officer DC

April 5, 2019 by cyberaware2 Leave a Comment

checkout the courses:
http://securitycompliance.thinkific.com

****
Title: Information System Security Officer (#ISSO)
Location : Washington, DC
Duration : Full time

Active Clearance required.

Description:
The contractor shall assist the government in the assessment process for all new and legacy systems to determine the security requirements associated with each system. The contractor shall interact with both technical and non-technical personnel in order to conduct a comprehensive review of a system, network or application. This is a technical role requiring moderate to advanced knowledge of security engineering, the #ATO process, enterprise monitoring, and incident response. The contractor shall assist in building or refining the program to achieve the assessment process. The contractor shall work with various elements of the cybersecurity team to understand roles, missions and requirements in order to inform this process.

Minimum Qualifications and Experience
At least 3 years serving as an Information Systems Security Officer (ISSO) at a cleared facility.
Minimum of 5 years work experience in a computer science- or Information Assurance-related field.
At least one of the following certifications: Certified Information Systems Security Professional (#CISSP), Global Information Security Professional (#GISP), or the CompTIA Advanced Security Practitioner (#CASP) or other certifications exemplifying skill sets such as those described in DoD Instruction #8570.1 IAM Level III proficiency.
Familiarity with the use and operation of security tools including Tenable. Nessus and/or SecurityCenter, IBM Guardium, Client Weblnspect, or like applications and Network Mapper (#NMAP).
A bachelor’s or advanced degree in Computer Science, Information Assurance, or Engineering is preferred.

Please provide the following information
Rate Expectation:
Full Name:
Contact No:
Alternate contact (if any):
Email address:
Current Location:
Relocation:
Availability:
Visa status

Kindly share your detailed resume at zoeyw@etalentnetwork.com

If you are qualified and interested in making a change or know of a friend who might have the required qualifications, please call me ASAP at (703) 261-7028 Ext.267, even if we have spoken recently about a different position. If you do respond via e-mail please include a daytime phone number so I can reach you. In considering candidates, time is of the essence, so please respond ASAP. Thank you.

Sincerely yours,
ZoeyWest
E TalentNetwork

Home


8251 Greensboro Drive, Suite 250
McLeanVA
zoeyw@etalentnetwork.com
(703) 261-7028 Ext.267

Filed Under: cyberspace workforce, DIARMF, Information Assurance, Information Assurance Jobs, IT Security Jobs, risk jobs, roles, security compliance Tagged With: ATO, casp, comptia, dod, information system security officer, ISSO, nessus, network, system, webinspect

STIG Update – Draft Backbone Transport Services (BTS) Policy STIG Ver 3

September 11, 2017 by Bruce Brown Leave a Comment

STIG Update – Draft Backbone Transport Services (BTS) Policy STIG Ver 3


DISA has released the Draft Backbone Transport Services (BTS) Policy STIG Version 3 for review. Please submit comments, recommended changes, and/or additions to the draft STIG by 15 September 2017 on the Comment Matrix spreadsheet, located with the STIG at https://iase.disa.mil/stigs/net_perimeter/backbone-transport/Pages/index.aspx. (NOTE: this is an extension to the suspense date provided in the release memo.) Comments should be sent via email to disa.stig_spt@mail.mil. Please include the title and version of the STIG in the subject line of your email.


For all STIG related questions, please contact the DISA STIG Customer Support Desk: disa.stig_spt@mail.mil

Filed Under: diarmf - implement, STIGS Tagged With: backbone, bts, disa, dod, Draft Backbone Transport Services (BTS), rmf, STIG

STIG Update – IAVM packages Updated

January 5, 2017 by Bruce Brown Leave a Comment

DISA has released the following IAVM packages:
http://iase.disa.mil/stigs/Pages/iavm.aspx (DoD PKI Certificate Required)

AIX 6.1 Ver 1, Rel 29
Apple OS 10.10 Workstation Ver 1, Rel 18
Apple OS 10.11 Workstation Ver 1, Rel 6
Apple OS 10.8 Workstation Ver 1, Rel 22
Apple OS 10.9 Workstation Ver 1, Rel 19
BlackBerry 10 OS Ver 1, Rel 20
Cisco IOS Ver 1, Rel 19
HP-UX 11.31 Ver 1, Rel 29
MAC OS X 10.6 Ver 1, Rel 29
Oracle Linux 5 Ver 1, Rel 22
Oracle Linux 6 Ver 1, Rel 22
RHEL 5 Ver 1, Rel 29
RHEL 6 Ver 1, Rel 27
Solaris 10 SPARC Ver 1, Rel 29
Solaris 10 x86 Ver 1, Rel 29
Solaris 11 SPARC Ver 1, Rel 22
Solaris 11 x86 Ver 1, Rel 22
Windows 7 Ver 1, Rel 27
Windows 8 and 8-1 Ver 1, Rel 27
Windows 2008 R2 Ver 1, Rel 27
Windows 2008 Ver 1, Rel 27
Windows 10 Ver 1, Rel 13
Windows 2012 and 2012 R2 Ver 1, Rel 25
Windows Vista Ver 1, Rel 27
zOS Ver 6, Rel 32

Filed Under: STIGS Tagged With: disa, disa stigs, dod, stigs

Full Time Position Need IT Admin Technical Lead location Lackland AFB, San Antonio TX

March 25, 2016 by Bruce Brown Leave a Comment

Position:                              IT Admin
Duration:                             Full Time
Location-                             Lackland AFB, San Antonio, TXSecurity Clearance: Active Top Secret clearance or higher
PRIMARY DUTIES:
–  Conduct network security monitoring and intrusion detection analysis for the NIPRNet and SIPRNet using the AF’s selected IDS/IPS toolset
–  Research NIPR and SIPR defensive cyber operations events to determine the necessity for deeper analysis and conduct an initial assessment of type and extent of intruder activities.
–  Enter event data into mission support systems according to operational procedures and reports through the 33rd operational chain.
–  Record suspicious events, meeting established thresholds, into the operational database for suspicious traffic. Records shall contain sufficient information to stimulate future research of suspicious traffic. The record shall answer the: who, what, where, why and when for this suspicious activity.
–  Provide computer security-related assistance to Air Force field units (example: the Integrated Network Operations and Security Center (INOSC), Base Information Assurance shop) in countering vulnerabilities, minimizing risk, and improving the security posture of AF computer networks and systems within the scope of operational requirements and mission execution.
BASIC QUALIFICATIONS:
–  Intermediate knowledge with one or more of the IDS/IPS systems currently in use by the Department of Defense (DoD), Services, and Agencies (i.e., AF, Navy, Army, DC3, DISA) or Federal Government and intermediate experience in the following areas:
EDUCATION REQUIREMENTS:
–  One or more of the following IAT Level II Certifications (GSEC, Security +, SSCP, CCNA-Security)
–  CND Certification (GCIA, CEH, GCIH).
Thanks & Regards,
Harpal Singh
Technical Recruiter
22nd Century Technologies Inc.(TSCTI)
Direct : (908) 765-0003 Ext: 315

Filed Under: cyberspace workforce, DIARMF Jobs, Information Assurance Jobs, risk jobs Tagged With: AF, Army, CCNA-Security, CEH, cnd, DC3, disa, dod, GCIA, GCIH, GSEC, IDS, IPS, Navy, security, SSCP

DISA has released the following updated Security Guidance, Security Readiness Review Scripts and Benchmarks

January 26, 2016 by Bruce Brown Leave a Comment

DISA has released the following updated Security Guidance, Security Readiness Review Scripts and Benchmarks:

Unclassified SRGs:  http://iase.disa.mil/stigs/srgs/Pages/index.aspx

Database SRG Ver 2, Rel 3
General Purpose Operating System SRG Ver 1, Rel 3
Network Device Management SRG Ver 2, Rel 4

Unclassified Application STIGs/SRGs:  http://iase.disa.mil/stigs/app-security/Pages/index.aspx

Access 2007 STIG Ver 4, Rel 13
Exchange 2010 Client Access STIG Ver 1, Rel 8
Exchange 2010 Edge STIG Ver 1, Rel 11
Exchange 2010 Hub STIG Ver 1, Rel 11
Exchange 2010 Mailbox STIG Ver 1, Rel 7
Exchange 2010 Overview Ver 1, Rel 6
Internet Explorer 10 STIG Ver 1, Rel 12
Internet Explorer 11 STIG Ver 1, Rel 7
McAfee Virus Scan 8.8 Local Client STIG Ver 5, Rel 8
McAfee Virus Scan 8.8 Managed Client STIG Ver 5, Rel 9
Mozilla Firefox STIG Ver 4, Rel 14
Oracle 11.2g Database STIG Ver 1, Rel 6
Oracle 12c Database STIG Ver 1, Rel 2
Oracle 11g Database STIG Ver 8, Rel 16
Outlook 2013 STIG Ver 1, Rel 6
SQL Server 2012 STIG Ver 1, Rel 9

Unclassified Mobility ISCG:  http://iase.disa.mil/stigs/mobility/Pages/index.aspx

Apple iOS 9 ISCG Ver 1, Rel 2

Unclassified Network STIGs:  http://iase.disa.mil/stigs/net_perimeter/Pages/index.aspx

CISCO CS DNS STIG Ver 4, Rel 18
DNS Policy STIG Ver 4, Rel 17
Enclave Test and Development STIG Ver 1, Rel 3
Harris SecNet 11/54 STIG Ver 6, Rel 9
Keyboard Video and Mouse Switch STIG Ver 2, Rel 6
MultiFunction Device and Network Printers STIG Ver 2, Rel 8
Network WLAN STIG Ver 6, Rel 11
Network WMAN STIG Ver 6, Rel 10
Network Perimeter Router L3 Switch STIG Ver 8, Rel 22
Video Tele-Conference Services Policy STIG Ver 1, Rel 8
Video Tele-Conference STIG Ver 1, Rel 6
Voice and Video over Internet Protocol (VVoIP) Policy STIG Ver 3, Rel 8
Voice and Video over Internet Protocol (VVoIP) STIG Ver 3, Rel 8
Windows Server 2012 DNS STIG Ver 1, Rel 3

Unclassified Operating System STIGs: http://iase.disa.mil/stigs/os/Pages/index.aspx

AIX 6.1 STIG Ver 1, Rel 6
ESXi 5 Virtual Machine STIG Ver 1, Rel 6
HP-UX 11.31 Manual STIG Ver 1, Rel 9
Oracle Linux 5 Manual STIG Ver 1, Rel 5
Oracle Linux 6 Manual STIG Ver 1, Rel 5
Red Hat 5 Manual STIG Ver 1, Rel 13
Red Hat 6 STIG Ver 1, Rel 10
Solaris 10 SPARC Manual STIG Ver 1, Rel 13
Solaris 10 x86 Manual STIG Ver 1, Rel 13
Solaris 11 SPARC Manual STIG Ver 1, Rel 6
Solaris 11 x86 Manul STIG Ver 1, Rel 6
SUSE Linux Enterprise Server (SLES) v11 for System z STIG Ver 1, Rel 7
Windows 8/8.1 STIG Ver 1, Rel 12
zOS ACF2 STIG Ver 6, Rel 26
zOS RACF STIG Ver 6, Rel 26
zOS TSS STIG Ver 6, Rel 26

FOUO Cross Domain Solution:  http://iase.disa.mil/stigs/cds/Pages/index.aspx
NOTE:  DoD PKI Certificate Required

JVAP Administrative STIG Ver 3, Rel 17

FOUO HBSS: http://iase.disa.mil/stigs/hbss/Pages/index.aspx
NOTE: DoD PKI Certificate Required

HBSS Agent Handler STIG  Ver 1, Rel 7
HBSS ePO 4.5 Site STIG Ver 4, Rel 15
HBSS ePO 4.6 STIG Ver 4, Rel 16
HBSS ePO 5.1 STIG Ver 1, Rel 7
HBSS HIP 8 STIG Ver 4, Rel 14
HBSS HIP STIG Ver 4, Rel 10

FOUO Network Perimeter:  http://iase.disa.mil/stigs/net_perimeter/Pages/index.aspx
NOTE:  DoD PKI Certificate Required

DoD Internet-NIPRNet DMZ STIG Ver 3, Rel 2

Benchmarks: http://iase.disa.mil/stigs/scap/Pages/index.aspx

AIX 6.1 STIG Benchmark Ver 1, Rel 6
HP-UX 11.31 STIG Benchmark Ver 1 Rel 10
Internet Explorer 10 STIG Benchmark Ver 1, Rel 7
Outlook 2013 STIG Benchmark Ver 1, Rel 3
Red Hat 5 STIG Benchmark Ver 1, Rel 14
Red Hat 6 STIG Benchmark Ver 1, Rel 10
Solaris 10 SPARC STIG Benchmark Ver 1, Rel 13
Solaris 10 x86 STIG Benchmark Ver 1, Rel 13
Windows 2008 R2 MS STIG Benchmark Ver 1, Rel 20
Windows 8/8.1 Benchmark Ver 1, Rel 13

STIGs no longer supported:  http://iase.disa.mil/stigs/sunset/Pages/index.aspx

AirWatch MDM STIG Ver 1, Rel 3
Windows DNS STIG Ver 4, Rel 1.19 (NOTE:  This STIG was based on Windows 2003 Operating System)
HP-UX 11.23 Manual STIG Ver 1, Rel 8

Filed Under: diarmf - implement, STIGS Tagged With: benchmark, disa, DMZ, dod, JVAP, NIPR, PKI, STIG

Windows Server 2012 Domain Name System (DNS) Security Technical Implementation Guide (STIG) Version 1

April 15, 2015 by Bruce Brown Leave a Comment

DISA has released the Windows Server 2012 DNS STIG Version 1. The
requirements of the STIG become effective immediately. The STIG is available
on IASE at:
http://iase.disa.mil/stigs/net_perimeter/network-other/Pages/network-other.a
spx.Windows-Server-2012-Domain-Name-System

VMS Users: The Windows 2012 Server DNS STIG requirements will need to be
manually applied to an asset in VMS by adding the “Windows 2012 DNS” element
(found under Computing>Application>DNS Applications) to the asset’s posture.

The “Windows DNS” element from the previous version DNS STIG will still
remain applied to the asset’s posture, along with the requirements related
to the previous version. That previous version element should be manually
removed from an asset’s posture once the assessment results from the
previous version are no longer needed.

Filed Under: Risk Management For DoD IT, STIGS Tagged With: dns, dod, domain name system, STIG, stigs, windows, windows server 12, windows server 2012 domain name system

Primary Sidebar

search


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Convocourses Podcast: Plan of Action and Milestone
  • Start with These IT Certifications (Part 1)
  • How to Tailor Security Controls in NIST 800
  • #cybersecurityjobs are recession proof
  • What IT Certifications for Information Security (part 2) (8140)

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • http://Www.Finance.Ipt.Pw/ on SRG/STIG Applicability Guide and Collection Tool Update
  • Elsa7 on ConvoCourses podcast: Cyber Security day to day activity
  • Tony on STIG Update – DISA has released the Microsoft SQL Server 2016 STIG Version 1
  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert

Tags

8140 8570 ArcSight c&a CISSP convocourses cyber cybersecurity cyber security DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce IA implement implementation info assurance information assurance information security ISSO IT it jobs it jobs in usa job jobs Linux mcafee network nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security STIG stigs unix windows


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book

Copyright © 2023 · Author Pro on Genesis Framework · WordPress · Log in