• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs
  • Log in

IA

information assurance engineer maryland Aberdeen

April 16, 2019 by cyberaware2 Leave a Comment

check me out on:
https://securitycompliance.thinkific.com

the Job:
Job Title: Information Assurance Engineer
Location: Aberdeen, MD
Position Type: Full Time

Clearance: Minimum Interim Secret

Must Have IAT Level 3 Certification.

Job Description:
Provides security engineering designs and implementation in all aspects of Information Assurance and Information Security (InfoSec) Engineering.
Assesses and mitigates system security threats/risks throughout the program life cycle; validates system security requirements definition and analysis; establishes system security designs; implements security designs in hardware, software, data, and procedures;
verifies security requirements; performs system certification and accreditation planning and testing and liaison activities, and supports secure systems operations and maintenance.
Mandatory Skills:
Demonstrated experience performing IA activities in support of software and system requirements, design, development, testing and sustainment
Experience with employment of IA requirements, policies, and processes to include authorization and accreditation as part of the RMF process
Experience with risk and vulnerability assessments and mitigation
Demonstrated ability to provide guidance on Intelligence Community (IC) Cyber/IA regulations and requirements to senior customers, senior LM leaders, and the program engineering staff
Experience with Security Information and Event Management (SIEM) correlation tools, Scanning (Nessus), and Host Based
Security System (HBSS)
Please provide the following information
Rate Expectation:
Full Name:
Contact No:
Alternate contact (if any):
Email address:
Current Location:
Relocation:
Availability:
Visa status

Kindly share your detailed resume at zoeyw@etalentnetwork.com

If you are qualified and interested in making a change or know of a friend who might have the required qualifications, please call me ASAP at (877) 733-3555 Ext.267, even if we have spoken recently about a different position. If you do respond via e-mail please include a daytime phone number so I can reach you. In considering candidates, time is of the essence, so please respond ASAP. Thank you.

Sincerely yours,
ZoeyWest
E TalentNetwork

Home


8251 Greensboro Drive, Suite 250
McLeanVA
zoeyw@etalentnetwork.com
(877) 733-3555 Ext.267

Filed Under: cyberspace workforce, Information Assurance, Information Assurance Jobs, information system compliance, IT Security Jobs, risk jobs, Risk Management For DoD IT, security compliance Tagged With: 8570, cyber, cybersecurity, HBSS, IA, IAT, information assurance, information assurance engineer, infosec, maryland, nessus, Risk Management Framework (RMF) for DoD Information Technology (IT), rmf, security engineer, SEIM, SIEM

Information System Security Officer sunnyvale, CA

April 4, 2019 by cyberaware2 Leave a Comment

check out my courses:
http://securitycompliance.thinkific.com

*****
the job in this video:
Job Title: Information Systems Security Officer
Location: Sunnyvale, CA
Duration: 6 Months (Possible extension)


Secret Clearance

Job Description:
Performs system and program auditing to ensure compliance to system security plan.
Conducts risk assessments and provides recommendations for secure implementation and compliance in accordance with government regulations and information assurance/cybersecurity guidelines. Creates, maintains and submits information system security documents and reports to regulatory agencies and leadership.
Assesses and mitigates system security threats/risks throughout the program life cycle; validates system security requirements definition and analysis; establishes system security documentation; assists with the implementation of security procedures; verifies information system security requirements; performs information system certification and accreditation planning, testing, assessing and liaison activities.
Familiar with information system security architectural documentation standards.
Able to apply information assurance / cyber security standards, directives, guidance and policies to an architectural/risk based framework.
Provide architectural / risk based analysis of information assurance / cyber security features and relate existing system to future needs and trends and requirements.

Skills Required
Windows client/server background. Some UNIX/LINUX technical experience, knowledge of OS security requirements and IS (Information Systems) auditing experience.
HBSS and SIPRNet experience required.

Experience Required
Previous ISSO and SIPRNet experience needed.

Education Required
Bachelor or equivalent work experience.

Please provide the following information
Rate Expectation:
Full Name:
Contact No:
Alternate contact (if any):
Email address:
Current Location:
Relocation:
Availability:
Visa status

Kindly share your detailed resume at zoeyw@etalentnetwork.com

If you are qualified and interested in making a change or know of a friend who might have the required qualifications, please call me ASAP at (703) 261-7028 Ext.267, even if we have spoken recently about a different position. If you do respond via e-mail please include a daytime phone number so I can reach you. In considering candidates, time is of the essence, so please respond ASAP. Thank you.

Sincerely yours,
ZoeyWest
E TalentNetwork

Home


8251 Greensboro Drive, Suite 250
McLeanVA
zoeyw@etalentnetwork.com
(703) 261-7028 Ext.267

Filed Under: cyberspace workforce, diarmf - implement, Information Assurance, Information Assurance Jobs, IT Security Jobs, risk jobs, Risk Management For DoD IT Tagged With: cyber, cyber security, IA, information assurance, information system security architectural, information system security officer, Information Systems Security Managers (ISSMs), ISSO, sunnyvale, threats

Sr Systems Administrator in Cedar Rapids, IA

February 15, 2016 by Bruce Brown Leave a Comment

This is a Job Opportunity from Rockwell Collins
Title                                       Sr Systems Administrator 1 (12446)
Location:                             Cedar Rapids, IA
Duration:                              29 W, 5 D
PLEASE NOTE:
**possibility of working remotely. if this is the case, there may be some training in Cedar Rapids. Travel expenses will be reimbursed for this training**
Job Description:
A challenging opportunity to be part of Rockwell Collins backup and storage strategies as we introduce modern redundancies, replications and cloud initiatives.
These positions are responsible for the design, standards, and overall availability and performance of the Rockwell Collins backup and storage environments. Reporting to the Manager of Enterprise Data Centers and Storage, this technical position will provide second and third tier technical support and participate in projects to ensure that they are implemented to RC’s satisfaction. These roles will also be responsible for Responsible for mentoring entry level admins
Requirements:
-Bachelor’s degree in appropriate discipline or in the absence of a degree, HS Diploma/Equivalent plus six years of related experience
-Minimum of 5-10 years related experience with emphasis in enterprise backup (EMC, NetApp, HP hardware).
-Previous experience working with multiple teams, including internal and external departments and organizations.
-Experience managing and leading virtual, cross-functional teams, including defining requirements, developing architecture designs, assisting in project plans, and delivering results.
Preferred Experience:
Demonstrated experience and/or certifications of following key technologies are a plus:
*EMC VNX,
*XtremIO
*Networker
*Avamar
*Data Domain
*VPLEX
*RecoverPoint
*Data Protection Advisor
*SRM
*Load balancing
*clustering

Filed Under: cyberspace workforce, DIARMF Jobs, risk jobs Tagged With: Avamar, Cedar Rapids, clustering, Data Domain, Data Protection Advisor, EMC VNX, IA, IT, jobs, Load balancing, Networker, RecoverPoint, Sr Systems Administrator, SRM, VPLEX, XtremIO

Jr. Information Assurance Analyst in Wright Patterson Dayton, Ohio

February 2, 2016 by Bruce Brown Leave a Comment

Position: Jr. Information Assurance Analyst
Duration: Full Time
Location- Wright Patterson Dayton, Ohio
 
We are looking to bring 2-3 staff to support our HIAR HIAM contract at wright Peterson Dayton, Ohio. We are looking to bring staff on full time basis. We are not looking any certification like CISSP but they need to have Security Plus

Filed Under: cyberspace workforce, DIARMF Jobs, Information Assurance Jobs Tagged With: CISSP, dayton, HIAM, HIAR, IA, information assurance, ohio, security

info assurance

February 11, 2014 by Bruce Brown Leave a Comment

IA
IA

Info assurance is a comprehensive approach to information security.  It included risk management, information protection, operational risk, business risk, assurance technology and much more.

More on “What is Info Assurance”?

Information assurance is the practice of assuring the confidentiality, integrity and availability of the processing, storing and/or transmission of data.  Information assurance is used as a more complete approach to information security.

Since Info Assurance covers all aspects of the security, all individuals with internal access to an organizations critical access must get info assurance awareness training.  Info Assurance is not just about turning on and configuring Assurance technology, but informing and educating those how have internal access to your system.

Info Assurance has its own complete common body of knowledge, industry, career path and degree programs accepted by the National Center of Academic Excellence in Information Assurance Education and those approved by the National Security Agency.

By becoming an info assurance specialist you can get work in many parts of the DoD including USAF, US Army, Department of the Navy and many other agencies.  But IA jobs expect specific certification(s), experience and degree.  The IA qualifications come from DoDD 8570 which is being replaced with DoDD 8140.  There are lots of titles that are considered within IA:  System Security Engineer, Info Assurance Analyst, Info Assurance Specialist, Info Assurance Subject Matter Expert (SME), Risk Analyst IT, and many others.

Filed Under: Assurance Technology, Information Assurance, information assurance degree online, Information Assurance Jobs, operational risk Tagged With: army information assurance, IA, ia jobs, IAM, IAO, info assurance, information assurance, information assurance air force, information protection, ISSM, ISSO, system security plan

Information Assurance Vulnerability Alert

February 8, 2014 by Bruce Brown 1 Comment

The DoD information system vulnerabilities are alerted with messages called Information Assurance Vulnerability Alerts (IAVA).  Vulnerabilities are evaluated to see what impact (if any) the might have and sent out by to all branches and units withing the organization.  This is done in accordance with DoDD 8500.1, Information Assurance directive.

Implementation of security-related software patches directed through the DoD IAVA program shall not be delayed pending evaluation of changes that may result from the patches. — DoDI 8500.2 Compliance with DoD-directed solutions, such as USSTRATCOM Command Tasking Orders (CTOs), Information Assurance Vulnerability Alerts (IAVAs), and Information Operation Conditions (INFOCONs) shall be a management review item. — DoDI 8500.2

RSS widget

Information assurance vulnerability alert are technical advisories, alerts and vulnerabilities of applications, operating systems, and servers identified by DoD Computer Emergency Response Team which is a division of the United States Cyber Command.    

Information Assurance Vulnerability Management (IAVM) is the process of the getting the IAVAs out to all Combatant Commands/Services/Agencies/Field Activities (CC/S/A/FAs). Specifically, the IAVM process:

  • Establishes positive control of the Department of Defense (DoD) Information Assurance Vulnerability Alert (IAVA) system
  • Provides access to vulnerability notifications that require action
  • Requires acknowledgement of action messages
  • Requires compliance and reporting status
  • Tracks compliance and reporting
  • Conducts random compliance checks

 

Filed Under: Information Assurance Tagged With: IA, IAVA, IAVM, information assurance, Information Assurance Vulnerability Alert

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to Next Page »

Primary Sidebar

search


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Convocourses Podcast: Plan of Action and Milestone
  • Start with These IT Certifications (Part 1)
  • How to Tailor Security Controls in NIST 800
  • #cybersecurityjobs are recession proof
  • What IT Certifications for Information Security (part 2) (8140)

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • http://Www.Finance.Ipt.Pw/ on SRG/STIG Applicability Guide and Collection Tool Update
  • Elsa7 on ConvoCourses podcast: Cyber Security day to day activity
  • Tony on STIG Update – DISA has released the Microsoft SQL Server 2016 STIG Version 1
  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert

Tags

8140 8570 ArcSight c&a CISSP convocourses cyber cybersecurity cyber security DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce IA implement implementation info assurance information assurance information security ISSO IT it jobs it jobs in usa job jobs Linux mcafee network nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security STIG stigs unix windows


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book

Copyright © 2023 · Author Pro on Genesis Framework · WordPress · Log in