Cyber Security Analyst
Corpus Christi, Texas, United States
-Provide technical assistance in RMF Assessment & Authorization (A&A) processes, analysis and reporting requirements in the area of cybersecurity, computer network defense (CND) and inventory management for the CCAD computing and network environments.
-Support the DoD Host-based Security Solution (HBSS) on-site maintaining policy compliance IAW DoD policies.
-Respond to and support all IT projects and efforts effecting network operations such as: deployments, DISA STIG compliance, desktop data encryption deployment, and vulnerability scanning.
-Provide technical support to the ISSO in developing and maintaining an effective Vulnerability Management program, performing risk analysis and supporting remediation and mitigation of detected vulnerabilities.
-Directly participate in activities traditionally associated with the DoD Information Assurance Vulnerability Management (IAVM) program.
-Be responsible for the use of and access to all approved DoD tools used to assess, validate and/or mitigate security vulnerabilities as well as test, mitigate and document software and hardware mitigation strategies in support of the DoD Risk Management Framework or other cybersecurity efforts.
-Use the Risk Management Framework (RMF) methodology to successfully implement a process to assess the security risk of all CCAD information systems, enclaves, and other computing and networking devices.
-Directly participate in IAVM program by utilizing tools such as Assured Compliance Assessment Solution (ACAS) to scan systems for vulnerabilities and analyze for trends.
-Perform automated and manual Security Technical Implementation Guides (STIG) scans of applicable systems and analyze for misconfigurations and trends.
-Assist with the review and completion of Assessment and Authorization (A&A) documentation required in the DoD Enterprise Mission Assurance Support Service (eMASS) that would be required to obtain AMC Authorizing Official (AO) favorable decision to issue an Authorization To Operate (ATO) as well as any activities and actions IAW DoD governance processes and procedures.
-Provide RMF recommendations, guidance, mitigation strategies, risk assessments, and assist with the preparation and delivery of artifacts, documentation, risk/security assessments, and track/monitor status using DoD Enterprise Mission Assurance Support Service (eMASS) system.
-Assist in developing Plans of Actions and Milestones (POA&Ms) documentation for systems within the CCAD Enclave.
-Assist with management of a local library of all documents, SOP, drawings and other artifacts which support all RMF efforts ensuring such artifacts are reviewed and updated and a provide monthly status reports submitted to the ISSM for review and acceptance.
-Perform Security Configuration Management support including research and development of applicable baselines, configuration scanning, and notification to owner and personnel accountable, tracking remediation, reporting and validation.
Security Clearance: SECRET, Interim SECRET required to begin work.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Clearance Compliance DoD Encryption Governance Risk analysis Risk assessment Risk management Security assessment Security Clearance Vulnerabilities Vulnerability management
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Ethical hacker / Pentester H/F jobs
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Architect jobs
- Open Product Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Staff Security Engineer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Chief Information Security Officer jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Security Specialist jobs
- Open Senior Information Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Cybersecurity Specialist jobs
- Open Security Researcher jobs
- Open Senior Security Architect jobs
- Open Sr. Security Engineer jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Application security-related jobs
- Open Pentesting-related jobs
- Open Agile-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open SaaS-related jobs
- Open Analytics-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open Security Clearance-related jobs
- Open Malware-related jobs
- Open DevOps-related jobs
- Open IDS-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open Kubernetes-related jobs
- Open Forensics-related jobs