Creates cyber-intelligence tools / methods and performs research and analysis in order to mitigate and eliminate high level data and cyber security risks. Designs, tests and implements state-of-the-art secure operating systems, networks, and database products. Conducts risk assessment and provides recommendations for application design.
Leads the investigation of complex computer and information security incidents to determine extent of compromise to national security information and automated information systems. Makes recommendations on how to implement additional security protocols to reduce similar security incidents in the future.
Defines security objectives and system-level performance requirements.
Researches and stays abreast of tools, techniques, countermeasures, and trends in computer network vulnerabilities.
Configures and validates secure systems, tests security products/systems to detect computer and information security weaknesses.
Maintains the computer and information security incident, damage and threat assessment programs.
Responsible for the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports.
Responsible for system audits and ensures all corrective measures are completed.
Designs, develops, or recommends integrated system solutions ensuring proprietary/confidential data and systems are protected.
Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and
accreditation of systems.
Reviews processes and security protocols and makes recommendations for increased cyber security protection.
Minimum Qualifications
Bachelor's Degree in Computer Science or a related field or equivalent experience; Advanced Degree preferred.
8-15 years of experience in systems security.
Other Job Specific Skills
Must be able to communicate effectively and clearly present technical approaches and findings.
Exercises considerable latitude in determining technical objectives of assignments.
Excellent attention to detail.
Must be able to balance multiple tasks simultaneously.
Advanced knowledge of encryption, vulnerability assessment, penetration testing, cyber forensics, intrusion detection, and incident response and remediation.
May interface with external entities including law enforcement, and intelligence/government agencies.
Exercises considerable latitude in determining technical objectives of assignment.
EEO Requirements
It is the policy of ASM that an individual's race, color, religion, sex, disability, age, gender identity, veteran status, sexual orientation or national origin are not and will not be considered in any personnel or management decisions. We affirm our commitment to these fundamental policies.
All recruiting, hiring, training, and promoting for all job classifications is done without regard to race, color, religion, sex, veteran status, disability, gender identity, or age. All decisions on employment are made to abide by the principle of equal employment.
S:SKINTVAGP1