Client Solution Architects
Information Systems Security Analyst
Client Solution Architects, Dahlgren, Virginia, United States, 22448
Join to apply for the
Information Systems Security Analyst
role at
Client Solution Architects .
Client Solution Architects (CSA) is currently seeking an Information Systems Security Analyst to support a program at Dahlgren, VA. This role is contingent on award.
For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions.
Cybersecurity Expertise
Cybersecurity principles, threats, vulnerabilities, and risk management processes
Encryption algorithms (IPSEC, AES, GRE, IKE, MD5, SHA, 3DES)
Data backup and recovery concepts and tools
Disaster recovery and continuity of operations planning
Host/network access control mechanisms (Access Control Lists (ACLs))
Incident response and handling methodologies
Intrusion detection methodologies and techniques
Network traffic analysis methods
Network protocols (TCP/IP, OSI model)
System and application security threats and vulnerabilities (buffer overflow, XSS, SQL injection)
Security architecture concepts and enterprise architecture reference models
National and international cybersecurity laws, regulations, policies, and ethics
Current and emerging threats and threat vectors
Enterprise incident response program, roles, and responsibilities
Penetration testing principles, tools, and techniques
Technical Proficiency
Computer networking concepts, protocols, and security methodologies
System performance and availability monitoring
System software and organizational design standards (ISO guidelines)
System life cycle management principles, including software security and usability
System/server administration and systems engineering concepts and methods
Server and client operating systems
Network security architecture concepts (topology, protocols, defense-in-depth)
Network systems management principles and tools
Basic system administration, network, and operating system hardening techniques
Cloud computing service and deployment models (SaaS, IaaS, PaaS)
Cloud security strategy and architecture
Data security standards (PII, PCI, PHI)
Leadership And Management
Information security program management and project management principles
Resource management principles and techniques
Risk management processes (assessment and mitigation)
Secure acquisitions (contracting duties, secure procurement, supply chain risk management)
Information technology (IT) supply chain security and risk management
Applicable laws, statutes, Presidential Directives, and guidelines related to cybersecurity and privacy
Organizational risk tolerance and risk management approach
Critical IT procurement requirements
Requirements
Clearance: Must possess and maintain an active Secret Clearance
Four (4) years of experience in Cybersecurity.
Certification: IAT Level II
Seniority Level
Mid-Senior level
Employment Type
Full-time
Job Function
Information Technology
Referrals increase your chances of interviewing at Client Solution Architects by 2x.
#J-18808-Ljbffr
Information Systems Security Analyst
role at
Client Solution Architects .
Client Solution Architects (CSA) is currently seeking an Information Systems Security Analyst to support a program at Dahlgren, VA. This role is contingent on award.
For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions.
Cybersecurity Expertise
Cybersecurity principles, threats, vulnerabilities, and risk management processes
Encryption algorithms (IPSEC, AES, GRE, IKE, MD5, SHA, 3DES)
Data backup and recovery concepts and tools
Disaster recovery and continuity of operations planning
Host/network access control mechanisms (Access Control Lists (ACLs))
Incident response and handling methodologies
Intrusion detection methodologies and techniques
Network traffic analysis methods
Network protocols (TCP/IP, OSI model)
System and application security threats and vulnerabilities (buffer overflow, XSS, SQL injection)
Security architecture concepts and enterprise architecture reference models
National and international cybersecurity laws, regulations, policies, and ethics
Current and emerging threats and threat vectors
Enterprise incident response program, roles, and responsibilities
Penetration testing principles, tools, and techniques
Technical Proficiency
Computer networking concepts, protocols, and security methodologies
System performance and availability monitoring
System software and organizational design standards (ISO guidelines)
System life cycle management principles, including software security and usability
System/server administration and systems engineering concepts and methods
Server and client operating systems
Network security architecture concepts (topology, protocols, defense-in-depth)
Network systems management principles and tools
Basic system administration, network, and operating system hardening techniques
Cloud computing service and deployment models (SaaS, IaaS, PaaS)
Cloud security strategy and architecture
Data security standards (PII, PCI, PHI)
Leadership And Management
Information security program management and project management principles
Resource management principles and techniques
Risk management processes (assessment and mitigation)
Secure acquisitions (contracting duties, secure procurement, supply chain risk management)
Information technology (IT) supply chain security and risk management
Applicable laws, statutes, Presidential Directives, and guidelines related to cybersecurity and privacy
Organizational risk tolerance and risk management approach
Critical IT procurement requirements
Requirements
Clearance: Must possess and maintain an active Secret Clearance
Four (4) years of experience in Cybersecurity.
Certification: IAT Level II
Seniority Level
Mid-Senior level
Employment Type
Full-time
Job Function
Information Technology
Referrals increase your chances of interviewing at Client Solution Architects by 2x.
#J-18808-Ljbffr