• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

security

Should I get security plus or experience first Q&A

November 6, 2021 by Bruce Brown Leave a Comment

Sign up for free at http://convocourses.com for deeper dives.  

Many more videos on https://www.youtube.com/convocourses

short videos at https://www.tiktok.com/@convocourses?lang=en

and https://www.instagram.com/convocourses/

https://www.facebook.com/ConvoCourses-108091850619388

Podcast version of the content:

https://podcasts.apple.com/us/podcast/convocourses/id1500188278

http://www.nist80037rmf.com/google_podcast

Filed Under: convocourses, IT Certifications, IT Security Jobs, NIST Security Framework, risk management, security compliance Tagged With: IT job, IT jobs for beginners, security, security plus, Should I get security plus or experience first Q&A

Microsoft Windows Defender Antivirus STIG V1R1

October 3, 2017 by Bruce Brown Leave a Comment

STIG Update – Microsoft Windows Defender Antivirus STIG V1R1


DISA Risk Management Executive has released the Microsoft Windows Defender Antivirus Security Technical Implementation Guide (STIG) Version 1 Release 1. The requirements of the STIG become effective immediately. The STIG is available on IASE at https://iase.disa.mil/stigs/app-security/antivirus/Pages/index.aspx.

 


For all STIG related questions, please contact the DISA STIG Customer Support Desk: disa.stig_spt@mail.mil

Filed Under: STIGS Tagged With: disa, ms, security, STIG, windows

Security Roles and Responsibilities

July 19, 2016 by Bruce Brown Leave a Comment

There are hundreds of different roles & responsibilities in the IT Security career field alone. Here are some of the common types that I have seen:

Information System Security Manager – coordinate with the system owner and the information system security officer to ensure security is on the systems.
Information System Security Officer – coordinate with management and system administrators to implement system security controls. Ensures security controls are tracked and documented.
System Administrator – applies technical functionality and security on information systems.
Architect – assists in the design of enterprise information systems.
Security Analyst – review the logs of information systems to determine if there are any malicious activities happening.
Auditors – review the information systems to make sure the security controls are applied, documented and continuously monitored.

Filed Under: cyberspace workforce, DIARMF Jobs, risk jobs, Risk Management For DoD IT, roles Tagged With: cyber security, responsibility, rmf, roles, security

Full Time Position Immediate Interview Need Network Technician location Gunter AFB Montgomery, AL with Air Force

April 11, 2016 by Bruce Brown Leave a Comment

Conduct network security monitoring and intrusion detection analysis for the NIPRNet and SIPRNet using the AF’s selected IDS/IPS toolset
–  Research NIPR and SIPR defensive cyber operations events to determine the necessity for deeper analysis and conduct an initial assessment of type and extent of intruder activities.
–  Enter event data into mission support systems according to operational procedures and reports through the 33rd operational chain.
–  Record suspicious events, meeting established thresholds, into the operational database for suspicious traffic. Records shall contain sufficient information to stimulate future research of suspicious traffic. The record shall answer the: who, what, where, why and when for this suspicious activity.
–  Provide computer security-related assistance to Air Force field units (example: the Integrated Network Operations and Security Center (INOSC), Base Information Assurance shop) in countering vulnerabilities, minimizing risk, and improving the security posture of AF computer networks and systems within the scope of operational requirements and mission execution.
BASIC QUALIFICATIONS:
–  Intermediate knowledge with one or more of the IDS/IPS systems currently in use by the Department of Defense (DoD), Services, and Agencies (i.e., AF, Navy, Army, DC3, DISA) or Federal Government and intermediate experience in the following areas:
EDUCATION REQUIREMENTS:
–  One or more of the following IAT Level II Certifications (GSEC, Security +, SSCP, CCNA-Security)
–  CND Certification (GCIA, CEH, GCIH).
Thanks & Regards,
Harpal Singh
Technical Recruiter
22nd Century Technologies Inc. (TSCTI)
8(a) / SDB | CMMI level 3 Certified
Direct: 1-908-765-0003 Ext: 315

Filed Under: cyberspace workforce, DIARMF Jobs, Information Assurance Jobs, risk jobs Tagged With: AF, Army, CCNA-Security, CEH, DC3, disa, GCIA, GCIH, GSEC, IAT Level, Navy, security, SSCP

Need Help Desk Specialist in Honolulu, HI with US Army

April 11, 2016 by Bruce Brown Leave a Comment

Job title :Help Desk Specialist
Location: Honolulu, HI
Client : US Army
CLEARANCE: SECRET
Description
  • The contractor shall provide service execution to CLIN conversion within two (2) business days.
  • The contractor shall provide service management to EITSMS processing within one (1) business day.
Contractor will implement and operate an IT Infrastructure Library (ITIL)-based service desk to provide the HQ a single assured point of contact for all Automated Data Processing (ADP) hardware, software, and networking problems; for service requests, to include new systems, major modifications to existing systems and entry points for emerging technologies. Also maintains service catalogs, an approved product list, and
a knowledge base for Service Desk operations. Adhere to HQs policy of using Information Technology Requests for all maintenance requests. Documents all users’ trouble calls and coordinates all software maintenance changes with government leads while ensuring project maintenance logs are maintained and reviewed.
Special Qualifications:
  • experience using Microsoft Office tools (Word, PowerPoint, Excel, and Outlook)
  • Security+ Certification
Thanks & Regards,
Kartik Jain
Technical Recruiter
Direct : 908-765-0002 Ext: 388

Filed Under: cyberspace workforce, DIARMF Jobs, Information Assurance Jobs, risk jobs Tagged With: HQ, IT Infrastructure Library, ITIL, security

Should You Get a Comptia Security+ IT Certification

March 30, 2016 by Bruce Brown Leave a Comment

The Comptia Security+ IT certification is a very good certification for IT professionals getting into IT security and for IT security professional that have been doing cyber security for a while.  If you already have a high-level security certification (i.e. CISSP, CISM,CISA,CASP) I would say the Security+ is not necessary, because those certs already cover everything in the Security+ and more.  But if you don’t have any general security certs then you should definitely get it.

What are the benefits:

It is a well known certification that lets employers know that you are more than familiar with security best practice.

Having the Security+ alone is enough to get a job or a raise in some situations.

If you are unfamiliar with all the security best practices it is a great start in getting to know an important body of knowledge.

It is 8570/8140 compliant.

 

For more information on the Security+: https://certification.comptia.org/certifications/security

Exam Codes SY0-401
Launch Date May 1, 2014
Exam Description CompTIA Security+ certification covers network security, compliance and operation security, threats and vulnerabilities as well as application, data and host security. Also included are access control, identity management, and cryptography.
Number of Questions Maximum of 90 questions
Type of Questions Multiple choice and performance-based
Length of Test 90 Minutes
Passing Score 750 (on a scale of 100-900)
Recommended Experience CompTIA Network+ and two years of experience in IT administration with a security focus
Languages English, Japanese and Portuguese
Retirement TBD – Usually three years after launch.
Price $3​11.00 USD (See all pricing)

dod 8570 chart
dod 8570 chart

Filed Under: cyberspace workforce, IT Certifications Tagged With: comptia, IT Certifications, security, security plus

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to Next Page »

Primary Sidebar

search


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Convocourses Podcast: Plan of Action and Milestone
  • Start with These IT Certifications (Part 1)
  • How to Tailor Security Controls in NIST 800
  • #cybersecurityjobs are recession proof
  • What IT Certifications for Information Security (part 2) (8140)

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • http://Www.Finance.Ipt.Pw/ on SRG/STIG Applicability Guide and Collection Tool Update
  • Elsa7 on ConvoCourses podcast: Cyber Security day to day activity
  • Tony on STIG Update – DISA has released the Microsoft SQL Server 2016 STIG Version 1
  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert

Tags

8140 8570 ArcSight c&a CISSP convocourses cyber cybersecurity cyber security DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce IA implement implementation info assurance information assurance information security ISSO IT it jobs it jobs in usa job jobs Linux mcafee network nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security STIG stigs unix windows


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book

Copyright © 2023 · Author Pro on Genesis Framework · WordPress · Log in