Required Skills

Cyber Security S

Work Authorization

  • US Citizen

  • Green Card

Preferred Employment

  • Corp-Corp

  • W2-Contract

Employment Type

  • Consulting/Contract

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 29th Oct 2022

JOB DETAIL

•             At least 13 years of IT securityexperience of which a minimum of three years must be in a senior position.

•             BS/BA undergraduate degree.

•             Determining and implementingcybersecurity and privacy principles to organizational requirements.

•             Experience developing incidentresponse process and procedures with internal and external stakeholders.

•             Knowledge of network securityarchitecture concepts including topology, protocols, components, and principles(e.g., application of defense-in-depth)

•             Knowledge of processes for seizingand preserving digital evidence.

•             Knowledge of system and applicationsecurity threats and vulnerabilities.

•             Strong background in documentingand assessing NIST 800-53 and CJIS controls.

Desired:

•             Assessing and providing strategicdirection for resolution of mission-critical problems, policies, andprocedures.

•             Experience building defensiblesecurity architectures for operational technology with a focus in cloudsecurity best practices

•             Experience developing disasterrecovery and continuity of operations policies, plans, and procedures.

•             Experience with defining, establishing,and directing techniques for detecting host and network-based intrusions usingintrusion detection technologies

•             Knowledge of anti-forensicstactics, techniques, and procedures.

•             Knowledge of applicable laws,statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code)

•             Knowledge of DDoS appliances suchas Net Scout Arbor, Fortinet Fort iGATE.

•             Knowledge of Insider Threatinvestigations, reporting, investigative tools and laws/regulations

•             Knowledge of laws, regulations,policies, and ethics as they relate to cybersecurity and privacy.

•             Knowledge of legal governancerelated to admissibility (e.g. Rules of Evidence).

•             Knowledge of malware analysis tools(e.g., Oily Debug, Ida Pro).

•             Knowledge of malware with virtualmachine detection.

•             Knowledge of NIST’s CybersecurityFramework (CSF) with a focus on response and recover control families.

•             Knowledge of types of digitalforensics data and how to recognize them.

•             Overseeing and interfacing directlywith agency and interagency leaders during cyber incidents.

•             Strong understanding ofvulnerability scanning solutions, and the ability to clearly document theassociated risks and remediation timelines.

•             Valid CISSP Certification

•             Writing business/processdocumentation, developing models and graphics and making oral presentations tosenior officials

Company Information