Unfortunately, this job posting is expired.
Don't worry, we can still help! Below, please find related information to help you with your job search.
Don't worry, we can still help! Below, please find related information to help you with your job search.
Some similar recruitments
Patient Care Coach Jobs
Recruited by Serenity Healthcare 8 months ago
Address Layton, UT, United States
Warehouse Team Member Jobs
Recruited by Interstate Batteries 8 months ago
Address Woods Cross, UT, United States
Administrative Assistant Jobs
Recruited by ecocareers 8 months ago
Address North Salt Lake, UT, United States
Engineer Jobs
Recruited by Layton City 8 months ago
Address Layton, UT, United States
Community Manager Jobs
Recruited by RHP Properties 8 months ago
Address Clearfield, UT, United States
Marketing Communications Manager Jobs
Recruited by Black Diamond Management Inc. 8 months ago
Address Taylorsville, UT, United States
Dual Diagnosis Therapist Jobs
Recruited by Davis Behavioral Health, Inc. 8 months ago
Address Layton, UT, United States
Receptionist (Farmington) Jobs
Recruited by Tanner Clinic 8 months ago
Address Farmington, UT, United States
Human Resource Specialist Jobs
Recruited by Academica West 9 months ago
Address Kaysville, UT, United States
Receptionist (Behavioral Health) Jobs
Recruited by Tanner Clinic 9 months ago
Address Layton, UT, United States
Receptionist Jobs
Recruited by Wasatch Peak Physical Therapy 9 months ago
Address Farmington, UT, United States
Museum Curator Jobs
Recruited by Syracuse City, Utah 9 months ago
Address Syracuse, UT, United States
Gsso Jobs
Company | ManTech |
Address | Clearfield, UT, United States |
Employment type | FULL_TIME |
Salary | |
Category | IT Services and IT Consulting |
Expires | 2023-07-18 |
Posted at | 11 months ago |
Secure our Nation, Ignite your Future
- Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation and alternatives to complex problems
- Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (e. g. SE Linux extensions to RHEL, PitBull, AppArmor, and Sentris) , video teleconferencing/VOIP, Oracle/MS SQL database security, and Apache/IIS Web server security
- Write and execute cybersecurity test procedures for validation of control compliance
- Provides expert level consultation and technical services on all aspects of Information Security
- Thinks independently and demonstrates exceptional written and oral communications skills. Applies advanced technical principles, theories, and concepts
- Represent the customer in various SSE related working groups, advisory groups, and advisory council meetings
- Develop improvements to security assessments with regard to accuracy and efficiency
- Chair and or Co-Chair customer and SAP community IA working groups, participate in ISSE IPT reviews
- Work as part of a security incident response team as needed
- Assist with site activation activities and design reviews
- Assist team to design, integrate, and implement JSIG/RMF Continuous Monitoring tools and processes
- Develop and provide IA risk management recommendations to the customer
- Advanced technical competency in one or more of the following supported platforms: Microsoft Windows Server, Active Directory, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, , Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office
- Analyze technical risk of emerging cybersecurity tools and processes
- Lead a team of System Security Engineers and Certification and Accreditation Analysts responsible for ensuring the customers national and international security interests are protected as support equipment are designed and tested
- Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process
- Integrate ancillary monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports
- Review ISSE related designs and provides security compliance recommendations
- Contributes to the development of new principles, concepts, and methodologies
- Assist with development and maintenance of the Program Protection Plan
- Provide ISSE support for Mission and Training systems design and development
- Strong background in Patch/Configuration management, DevOps, and tier 3 support
- Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
- Leads technical teams in implementation of predetermined long-range goals and objectives
- Recommends cybersecurity software tools and assists in the development of software tool requirements and selection criteria to include the development of product specific STIGs from applicable DISA SRGs
- Perform security assessments of servers/network devices/security appliances
- Works on unusually complex technical problems and provides highly innovative and ingenious solutions
- Review ISSE related designs and provides security compliance recommendations
- Represent the customer in various ISSE related working groups, advisory groups, and advisory council meetings
- Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk
- Integrate/Develop new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels
- Supports customer and SAP community IA working groups, participate in SSE IPT reviews
- Provides expert level consultation and technical services on all aspects of Information Security
- Integrate COTS & GOTS products to collect, display and remediate a variety of automated system security and system operations/performance functions and metrics
- Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them
- Build operational Operations and Maintenance (O&M) checklists to maintain the service (daily, weekly, monthly, yearly O&M checklists); build Tactics, Techniques and Processes (TTPs) and Standard Operating Processes (SOPs) associated with service checklists
- Prior performance in roles such as ISSO, ISSM, SCA or SAP IT Technical Director
- Bachelor’s degree in a related discipline or equivalent experience (4 years)
- Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Manager Level II within 6 months of the date of hire
- Current TS clearance with SCI eligibility
- Willingness to submit to a Counterintelligence polygraph
- Eligibility for access to Special Access Program Information
- Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards. Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
-
Systems Analyst - Excel, Xml, Sql, Scripting
By CyberCoders At Salt Lake City, UT, United States 8 months ago
-
(Senior) Finance & Shared Services Manager
By Catholics For Choice At Washington, DC, United States 8 months ago
-
Paralegal - Probate Administration
By CyberCoders At Miami, FL, United States 8 months ago
-
Account Executive - Automotive Software
By ECW Search At United States 8 months ago
-
Construction Project Coordinator Jobs
By CyberCoders At River Falls, WI, United States 8 months ago