TS/SCI – Cyber Auditor/Inspector – Security Auditing – Reston, VA

 In

Cyber Auditor/Inspector – Security Auditing – Reston, VA

⦁ Identify and manage network computer and system security events relative to fraud, waste and abuse, including content inappropriate to the workplace, Illegal

Activity, Productivity Loss and Non-Compliant Activity, as well as Identity Leakage (PII).

⦁ Perform forensic analysis of digital information and gathers and handles evidence.

⦁ Utilization of tools such as Archer, Splunk, Fidelis, Solera, Proofpoint, etc.

⦁ Prepare case evidence and incident reports.

⦁ Work on special projects as assigned.

⦁ May provide guidance and work leadership to less-experienced technical staff members.

Position may require evening, weekend or shift-work (depending on operational tempo)

STANDARD CHARACTERISTICS:

o Identify and manage network and system vulnerabilities and security events

o Receive, acknowledge, disseminate, track, report (daily/weekly, and update vulnerability management (VM) alerts, vulnerability assessments, red/blue team events, security incidents, and the VM common operating picture (VM COP)

o Provide inspection services across the enterprise on behalf of the organization’s Special Enclave (SE) program manager

o Support or perform global DoD inspections of GENSER and SE (e.g., JWICS) services to ensure compliance to DoDI 8530 standards

LEVEL 4 o Skills and Tasks. Exceptionally Complex, Inter-Discipline, Inter-Organizational. Can perform tasks of senior level technicians, specialists, and or managers not performed at Level 3 due to the size and/or complexity of the tasks.

o Leadership/Management. May work individually or as a key member of a senior leadership team. Oversees and monitors performance across several disciplines, and when required, takes steps to resolve issues.

o Guidance. Provides expert guidance and direction to Government and Vendor senior level technicians and managers. Directs multiple contractor and subcontractor teams through to project completion.

o Training and Certifications. DoD 8570 compliance or information assurance certification commensurate with technical objectives and services required within the task order. Applicable software or hardware training and certifications commensurate with the technical objectives, services required, and IT environment specified within the task order.

o Capabilities and additional Requirements. Apply Standard Characteristics of Labor Category Capability Levels.

o Education and Experience.  HS/GED + 12 years

 Associates Degree + 10 years

 Bachelor’s Degree + 8 years

 Master’s Degree + 6 years

 PhD + 4 years

To apply for this job email your details to cybersecure@rainmakerbiz.com

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt

Start typing and press Enter to search