![]() ![]() 2+ years of knowledge and experience with ACAS and HBSS administration.2+ years of experience in a Splunk role working in a Splunk clustered environment.Must meet DoD 8570.01-M IAT-II baseline certification requirements such as SEC+ or equivalent.BS or BA degree in a Computer Science or a related scientific discipline.Well-developed verbal and written communication skills.Experience with developing and presenting vulnerability information for technical and non-technical audiences.Assist with POA&M management, mitigation statement formulation, interfacing with system administrators to resolve open findings of high and at-risk systems.Assist with the development and maintenance of information security policies, standards, and control procedures to enable compliance with RMF.Assist with periodic and regular security assessments.Provide Tier 3 maintenance support for deployed cyber security technologies.Identify potential conflicts with implementation of any cyber security tools within the enterprise and develop recommendations to remediate these conflicts.Configure, operate, and maintain ForeScout, Trip Wire and Ivanti tool suites.Provide guidance on vulnerability and malware remediation. ![]() Configure, operate, and maintain HBSS and its components (ePolicy Orchestrator, McAfee Agent, Data Loss Prevention, Host Intrusion Prevention System, Policy Auditor, Asset Baseline Monitor, and Virus Scan Enterprise) on Windows/Linux creating exceptions to allow essential processes to continue uninterrupted.Configure, optimize, and test vulnerability scans against new and existing Operating Systems/platforms.Administration/operation of information security compliance tools/platforms with a special concentration in managing the Assured Compliance Assessment Solution (ACAS) and ForeScout.Design technical, operational, and organizational controls to maintain acceptable security posture.Effectively choose the appropriate standards, processes, procedures, and tools throughout the system development life cycle to support the generation of the security engineering products.Creates and implements methods and procedures for inspecting, testing, and evaluating the security and effectiveness of products and production equipment. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |