Information Security Advisorother related Employment listings - Rockville, MD at Geebo

Information Security Advisor

NTT DATAis seeking a highly motivated, flexible, organized, and detail-orientedInformation Security Engineer - CDM advisorto join our dynamic team atRockville, MD.
If you want to learn, grow, and help then this is the job for you.
We support a project/customer that 'seeks to better understand, treat, and ultimately prevent infectious, immunologic, and allergic disease seeks fundamental knowledge about the nature and behavior of living systems and the application of that knowledge to enhance health, lengthen life, and reduce illness and disability.
What you do matters and has significant impact on the medical and scientific communities we serve.
Your work here really matters and has real impact.
Job
Responsibilities:
NTTDATA is seeking an information security analyst who will be a key member of a consulting team providing advice and support, to federal agencies, in the areas of Information Security.
This role will be primarily responsible forAnalyzes data (events, alerts, vulnerabilities, etc.
) from cyber security tools and performs cross-walks to NIST 800-53 controls to support a continuous diagnostic and monitoring environment for systems with authority to operate within the organizationAnalyzes data from internal systems (system exemptions, waivers, etc.
) against authorization boundaries and performs cross-walks to NIST 800-53 controls to support a continuous diagnostic and monitoring environment for systems with authority to operate within the organizationAbility to correlate all reported events from various multiple systems and network areas where potential security incident is identified; ensure the situation is handled promptly and effectively by starting the process of security incident responseAbility to determine and recommend changes needed to ATO documentation (BIA, ETA, SSP, SAR, etc.
) as a result of data collected and correlated back to security controls that have been impactedReview configuration of security solutions applied in protecting company asset such that the implemented SIEM solution reports all pertinent events and ensure it effectively identify and alert upon potential security events, as well as reduce false positives simultaneouslyAssist in the configuration of intrusion detection and prevention solutions based in the host and network servers to effectively identify potential security incidentsRecommend and review dashboards for monitoring security information for the management and Information Security team, to be able to provide various degree of visibility both real-time and over extended periods of the security events within the environmentParticipate in the process of selecting and reviewing of information security solutionsAssist in compiling and producing reports on monthly issue and trend for the enhancement of the functions of the Enterprise Security and Support managementMake recommendations for changes to the environment that can help in the removal of vulnerabilities and reduction in the risk of exploitation that may result in potential incidentsParticipate in ensuring team processes and documentation are effectively documented and maintainedBasic
Qualifications:
BA or BS degree in MIS, CS, or related cybersecurity discipline or equivalent experience.
Minimum 8 years experience in Information Security is required along with excellent knowledge of at least 3 of the following:
Assessment and Accreditation of systemsSecurity Operations Center supportVulnerability management and remediationCarving, compiling and analyzing security incident related artifactsNetwork forensicsExcellent attention to detail and analytical skills required.
Overall Risk Management processes (eg, methods for assessing, mitigating and accepting risks).
Cybersecurity principles, security models, organizational requirements (wrt confidentiality, integrity, availability, authentication, non-repudiation), cyber threats, risks and vulnerabilities, cryptography and cryptographic key management concepts, host/network access control mechanisms (eg, ACLs), network access, identity, & access management (eg, PKIs), Computer networking concepts and protocols, and network security methodologies.
Knowledge of cyber threats and vulnerabilities; Ethical hacking principles, general attack stages; Specific operational impacts of cybersecurity lapses; programming language structures and logic.
Able to communicate, verbally and in writing, complex technical issues with simplicity & clarity.
Preferred Skills:
Experience with various cyber security monitoring tools to include:
Tenable, Netsparker, Forescout, DBProtect,Exposure to various cyber security incident / even management tools:
Splunk, Qradar, ArcsightKnowledge of end point protection tools, such as:
McAfee, Symantec, Cylance, AbsoluteKnowledge of FISMA and NIST 800-53 security controls and assessment and accreditation requirementsPrior experience supporting federal government agenciesApplicants selected will be subject to a Public Trust background security investigation and may need to meet eligibility requirements for access to sensitive information.
US Citizens or Permanent Residents only.
by Jobble.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.