Job Search:
 
job board -- all
job board -- jobs only
job board -- add a post
           home >> computer and telecom >> job board >> post


 

Sr. Analyst, Cybersecurity


Posted by: Linda McCarron- Johnson Service Group <lmccarron@jsginc.com> on December 03, 2018 at 09:26:02. Click here to reply to this post via Email.Click here for help with email link

Contract / Temp to Direct / Direct Hire: Contract
City: Chattanooga
State: Tennessee
Country: United States

Sr. Analyst, Cybersecurity
12-18 months for Chattanooga, TN
Contract
Please send me your resume in word format.


Researches, analyzes and translates Federal laws, regulations and security industry best practices and determines applicability and impact to incorporating into agency governance in easily understood presentation.
Develops and manages policies and procedures at the corporate and organizational level ensuring agency cyber security reliability and accessibility to prevent and defend against unauthorized access to systems, networks, and data.
Facilitates and manages agency-wide security programs designed to protect the confidentiality, integrity and availability of cyber assets and data.
Ensures the effectiveness of the Enterprise Cybersecurity training program through appropriate planning, implementation, and evaluation.
Plans and manages agency-wide cybersecurity projects utilizing innovative concepts and approaches where precedents do not exist, ensuring project resources, cost and schedule are appropriately managed. Conducts and manages systems security evaluations and reviews including development of systems security plans, implementation and maintenance of risk assessments, management of the security authorization of systems, and development and maintenance of security categorizations.
Coordinates, prepares and manages formal responses to cybersecurity inquires from internal and external authorities such as the Office of Inspector General (OIG) and General Accounting Office (GAO).
Prepares agency reports for internal and external audiences including audiences at a federal level.
Communicates directly, independently and with appropriate authority with program management on cyber security issues. Represents Enterprise Information Security and Policy on agency-wide projects and provides support to various committees (which often include officers of the agency) that have been established to resolve key cybersecurity issues and federal regulations or recommended guidance [Federal Information Security Act of 2002 (FISMA), National Institute of Standards (NIST), etc.]
Responds to incident investigations, performs triage activities, and utilizes structured methodologies to prevent, detect respond to threats. Supports control and vulnerability assessments to identify weaknesses and assess the effectiveness of existing controls, and recommends remedial action
Develops security processes, work instructions and incident action plans to ensure that security controls are managed and maintained. Recommends security configuration and operations standards for security systems and applications, including policy assessment and compliance tools, network security appliances, and host-based security systems.


Education – Bachelor’s degree in computer science, cybersecurity, engineering or a related field or equivalent experience. Experience - Three or more years experience in operational security, governance or information system auditing.
Certification/License, etc — None required; CISSP, COMPTIA Security +, preferred
Knowledge/Skills/Abilities — Intermediate information security understanding. Broad knowledge of business functions and related security needs. Demonstrated competencies in analysis. teamwork, customer service, planning/organization, flexibility, stress tolerance and communication. Must be self-motivated and capable of performing most assignments with limited supervision. Must have the ability to manage multiple activities simultaneously. Excellent ability to research, evaluate and make recommendations as to policy applicability. Must possess knowledge and understanding of organizations, policies and operations of TVA. Must have ability to work harmoniously with peers, customers, executives,
Researches, analyzes and translates Federal laws, regulations and security industry best practices and determines applicability and impact to TVA incorporating into agency governance in easily understood presentation.
Develops and manages policies and procedures at the corporate and organizational level ensuring agency cyber security reliability and accessibility to prevent and defend against unauthorized access to systems, networks, and data.
Facilitates and manages agency-wide security programs designed to protect the confidentiality, integrity and availability of cyber assets and data.
Ensures the effectiveness of the Enterprise Cybersecurity training program through appropriate planning, implementation, and evaluation.
Plans and manages agency-wide cybersecurity projects utilizing innovative concepts and approaches where precedents do not exist, ensuring project resources, cost and schedule are appropriately managed.
Conducts and manages systems security evaluations and reviews including development of systems security plans, implementation and maintenance of risk assessments, management of the security authorization of systems, and development and maintenance of security categorizations.
Coordinates, prepares and manages formal responses to cybersecurity inquires from internal and external authorities such as the Office of Inspector General (OIG) and General Accounting Office (GAO).
Prepares agency reports for internal and external audiences including audiences at a federal level.
Communicates directly, independently and with appropriate authority with program management on cyber security issues.
Represents Enterprise Information Security and Policy on agency-wide projects and provides support to various committees (which often include officers of the agency) that have been established to resolve key cybersecurity issues and federal regulations or recommended guidance [Federal Information Security Act of 2002 (FISMA), National Institute of Standards (NIST), etc.]
Responds to incident investigations, performs triage activities, and utilizes structured methodologies to prevent, detect respond to threats.
Supports control and vulnerability assessments to identify weaknesses and assess the effectiveness of existing controls, and recommends remedial action
Develops security processes, work instructions and incident action plans to ensure that security controls are managed and maintained.
Recommends security configuration and operations standards for security systems and applications, including policy assessment and compliance tools, network security appliances, and host-based security systems.
Education – Bachelor’s degree in computer science, cybersecurity, engineering or a related field or equivalent experience
Experience - Three or more years’ experience in operational security, governance or information system auditing.
Certification/License, etc — None required; CISSP, COMPTIA Security +, preferred
Knowledge/Skills/Abilities — Intermediate information security understanding. Broad knowledge of business functions and related security needs. Demonstrated competencies in analysis. teamwork, customer service, planning/organization, flexibility, stress tolerance and communication. Must be self-motivated and capable of performing most assignments with limited supervision. Must have the ability to manage multiple activities simultaneously. Excellent ability to research, evaluate and make recommendations as to policy applicability. Must possess knowledge and understanding of organizations, policies and operations. Must have ability to work harmoniously with peers, customers, executives.







      

147 page view(s)



Thinking about applying for this position?
Please make sure that you meet the minimum requirements indicated for the job before you apply (see user agreement). If you are qualified, then use either the email link (near top of post) or the application link (near bottom of post) to apply, whichever is provided.


[ Back ] [ The Roadtechs Computer and Telecom Job Board ] [ FAQ ] [Edit ] [Mark Position Closed ]

© Copyright - Roadtechs®, LLC. All rights reserved. No reproduction of any part of this website may be sold or
distributed for commercial gain nor shall it be modified or incorporated in any other work, publication, or website.
Use of this site implies compliance with the Roadtechs User Agreement.