US Citizen
Green Card
Corp-Corp
W2-Contract
Consulting/Contract
UG :- - Not Required
PG :- - Not Required
No of position :- ( 1 )
Post :- 29th Oct 2022
• At least 13 years of IT securityexperience of which a minimum of three years must be in a senior position.
• BS/BA undergraduate degree.
• Determining and implementingcybersecurity and privacy principles to organizational requirements.
• Experience developing incidentresponse process and procedures with internal and external stakeholders.
• Knowledge of network securityarchitecture concepts including topology, protocols, components, and principles(e.g., application of defense-in-depth)
• Knowledge of processes for seizingand preserving digital evidence.
• Knowledge of system and applicationsecurity threats and vulnerabilities.
• Strong background in documentingand assessing NIST 800-53 and CJIS controls.
Desired:
• Assessing and providing strategicdirection for resolution of mission-critical problems, policies, andprocedures.
• Experience building defensiblesecurity architectures for operational technology with a focus in cloudsecurity best practices
• Experience developing disasterrecovery and continuity of operations policies, plans, and procedures.
• Experience with defining, establishing,and directing techniques for detecting host and network-based intrusions usingintrusion detection technologies
• Knowledge of anti-forensicstactics, techniques, and procedures.
• Knowledge of applicable laws,statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code)
• Knowledge of DDoS appliances suchas Net Scout Arbor, Fortinet Fort iGATE.
• Knowledge of Insider Threatinvestigations, reporting, investigative tools and laws/regulations
• Knowledge of laws, regulations,policies, and ethics as they relate to cybersecurity and privacy.
• Knowledge of legal governancerelated to admissibility (e.g. Rules of Evidence).
• Knowledge of malware analysis tools(e.g., Oily Debug, Ida Pro).
• Knowledge of malware with virtualmachine detection.
• Knowledge of NIST’s CybersecurityFramework (CSF) with a focus on response and recover control families.
• Knowledge of types of digitalforensics data and how to recognize them.
• Overseeing and interfacing directlywith agency and interagency leaders during cyber incidents.
• Strong understanding ofvulnerability scanning solutions, and the ability to clearly document theassociated risks and remediation timelines.
• Valid CISSP Certification
• Writing business/processdocumentation, developing models and graphics and making oral presentations tosenior officials