Creates cyber-intelligence tools / methods and performs research and analysis in order to mitigate and eliminate high level data and cyber security risks. Designs, tests and implements state-of-the-art secure operating systems, networks, and database products. Conducts risk assessment and provides recommendations for application design. Responsible for the full range of security issues including architectures, firewalls, electronic data traffic, and network access.
Experience in Information Assurance (IA) and Cybersecurity.
Familiarity with resolving network vulnerabilities and ensuring users are in compliance through the use of ACAS.
Plans and schedules Authority to Operate (ATO)/Authority to Connect (ATC).
Oversees the investigation of complex computer and information security incidents to determine extent of compromise to national security information and automated information systems. Makes strategic recommendations on how to implement state of the art security protocols.
Defines security objectives and system-level performance requirements.
Researches and stays abreast of tools, techniques, countermeasures, and trends in computer network vulnerabilities.
Oversees the configuration and validation of secure systems, tests security products/systems to detect computer and information security weaknesses.
Administers the computer and information security incident, damage and threat assessment programs.
Ensures the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports is completed.
Manages system audits and ensures all corrective measures are implemented.
Designs, develops, or recommends integrated system solutions ensuring proprietary/confidential data and systems are protected.
Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and
accreditation of systems.
Reviews processes and security protocols and makes recommendations for increased cyber security protection.
Minimum Qualifications
Ten (10) or more years in the field or related area; at least three (3) years of experience working in South Korea
BA/BS in information technology or related discipline
Certifications: CISSP-ISSMP or GSLC, ITIL V3
SECRET Clearance
Other Job Specific Skills
Must be able to communicate effectively and clearly present technical approaches and findings.
Exercises considerable latitude in determining technical objectives of assignments.
Excellent attention to detail.
Must be able to balance multiple tasks simultaneously.
Expert knowledge of encryption, vulnerability assessment, penetration testing, cyber forensics, intrusion detection, and incident response and remediation.
Interfaces with external entities including law enforcement, and intelligence/government agencies.
Exercises considerable latitude in determining technical objectives of assignment.
Strong ability to developed trusted relationships with customers.
Guides the successful completion of major projects.
Compensation Ranges
Compensation ranges for ASM Research positions vary depending on multiple factors; including but not limited to, location, skill set, level of education, certifications, client requirements, contract-specific affordability, government clearance and investigation level, and years of experience. The compensation displayed for this role is a general guideline based on these factors and is unique to each role. Monetary compensation is one component of ASM's overall compensation and benefits package for employees.
EEO Requirements
It is the policy of ASM that an individual's race, color, religion, sex, disability, age, sexual orientation or national origin are not and will not be considered in any personnel or management decisions. We affirm our commitment to these fundamental policies.
All recruiting, hiring, training, and promoting for all job classifications is done without regard to race, color, religion, sex, disability, or age. All decisions on employment are made to abide by the principle of equal employment.
Physical Requirements
The physical requirements described in "Knowledge, Skills and Abilities" above are representative of those which must be met by an employee to successfully perform the primary functions of this job. (For example, "light office duties' or "lifting up to 50 pounds" or "some travel" required.) Reasonable accommodations may be made to enable individuals with qualifying disabilities, who are otherwise qualified, to perform the primary functions.
Disclaimer
The preceding job description has been designed to indicate the general nature and level of work performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities and qualifications required of employees assigned to this job.
113,900-175,000
EEO Requirements
It is the policy of ASM that an individual's race, color, religion, sex, disability, age, gender identity, veteran status, sexual orientation or national origin are not and will not be considered in any personnel or management decisions. We affirm our commitment to these fundamental policies.
All recruiting, hiring, training, and promoting for all job classifications is done without regard to race, color, religion, sex, veteran status, disability, gender identity, or age. All decisions on employment are made to abide by the principle of equal employment.
S:CLZOH CLZEAST