Cyber Info Assurance Anlyst Resume Samples

4.9 (86 votes) for Cyber Info Assurance Anlyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the cyber info assurance anlyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
RC
R Connelly
Roel
Connelly
5396 Cartwright Junction
Phoenix
AZ
+1 (555) 120 0511
5396 Cartwright Junction
Phoenix
AZ
Phone
p +1 (555) 120 0511
Experience Experience
Houston, TX
Cyber Info Assurance Anlyst
Houston, TX
Dare LLC
Houston, TX
Cyber Info Assurance Anlyst
  • Install perimeter defense systems including intrusion detection systems, firewalls, grid sensors, etc., and enhance rule sets to block sources of malicious traffic
  • Develop and implement access control lists on routers, firewalls, and other network devices
  • Assist in implementation of RMF-based policies and procedures; make recommendations on process tailoring, participate in and document process activities
  • Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems
  • Perform system scans, administration, architecture, and engineering duties
  • Review requests for adding software to network infrastructure
  • Establish strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems
Phoenix, AZ
Cyber Info Assurance Anlyst
Phoenix, AZ
Cremin and Sons
Phoenix, AZ
Cyber Info Assurance Anlyst
  • Analyze system performance for potential security problems. Assess the performance of IA security controls within the NE
  • Provide support for development and enhancement of security engineering inputs to program documentation
  • Conduct periodic scans and inspections to ensure compliance with the Risk Management Framework (RMF) documentation package
  • Work network security incidents to include identification, reporting, analysis, and continued reporting
  • Documents the results of Assessment and Authorization activities and technical or coordination activity and prepare the System Security Plans and update the Plan of Actions and Milestones POA&M
  • Oversee Patch Management with a focus on utilizing tools to build queries and create status reports
  • Includes support of process, analysis, coordination, security certification test, security documentation, as well as investigations, software research, hardware introduction and release, emerging technology research inspections and periodic audits
present
Dallas, TX
Jrdc Cyber Info Assurance Anlyst
Dallas, TX
Littel, Wolf and Hintz
present
Dallas, TX
Jrdc Cyber Info Assurance Anlyst
present
  • Provide input to, and interface in customer meetings, or providing status input to management
  • Provide input to, and interface in customer meetings, or providing status input to higher level management
  • Provide technical security engineering support for projects involving software/hardware/network systems
  • Include support of process, analysis, coordination, security certification test, security documentation, as well as investigations, software research, hardware introduction and release, emerging technology research inspections and periodic audits
  • Document the results of Assessment and Authorization activities and technical or coordination activity and prepare the System Security Plans and update the Plan of Actions and Milestones POA&M
  • Provide support for development and enhancement of security engineering inputs to program documentation and Security Authorization packages
  • Document the results of Certification and Accreditation activities and technical or coordination activity and prepare the system Security Plans and update the Plan of Actions and Milestones POA&M
Education Education
Bachelor’s Degree in Information Technology
Bachelor’s Degree in Information Technology
Kaplan University
Bachelor’s Degree in Information Technology
Skills Skills
  • Strong verbal and written communication skills
  • Vulnerability assessment experience
  • Experience in installing and configuring Linux, Unix and Windows operating systems and applications
  • Develop trouble tickets & Support System Problem Report analysis
  • Perform system scans, administration, architecture, and engineering duties
  • Participate in technical interchange meetings
  • Provide support for development and enhancement of security engineering inputs to program documentation
  • Provide input to, and interface in customer meetings, or providing status input to higher level management
  • Data & traffic analysis
  • Incident response activities
Create a Resume in Minutes

1 Cyber Info Assurance Anlyst resume templates

1

Cyber Info Assurance Anlyst Resume Examples & Samples

  • Master’s degree in Information Technology, Cybersecurity, or related discipline
  • 10 years of experience in related IT field, i.e., servers,
  • Routers, firewalls
  • Must be able to obtain and maintain a DoD 8570.01-M CND-Auditor certification (CISA, GSNA, or CEH)
  • Candidate must have a DoD Secret security clearance to start; must have or be able to obtain a DoD
  • Top Secret clearance
  • Experience with security analysis and solutions in a WAN/LAN
  • Environment
  • Must be willing to travel; travel is infrequent and often less than two weeks if needed
2

Cyber Info Assurance Anlyst Resume Examples & Samples

  • Manage the security (hardware/software) requirements including communications, network interfaces, trusted system, trusted computing, TEMPEST and all Government security requirements (including Continuous Monitoring procedures, ICD 503 and NSSI No. 1253)
  • Participate in architectural discussions and provide input related to system security vulnerabilities brought on through hardware and software modifications, upgrades, and changes
  • Provide guidance to Software Developers, Systems Engineers, and Operations staff on system security, Certification & Accreditation (C&A) issues, information security policy, and determine security issues and impacts
  • Perform system C&A planning, assessment validation, testing, and liaison activities
  • Assist in the installation, configuration, administration, and system security of a multi-platform environment which includes Redhat Linux VMWare ESX, Mac OS and Sun Solaris; adheres to strong systems administration techniques and procedures
  • Establish and maintain best practices and procedures for patch management, virus management, and operating system upgrades
  • Provide automated system monitoring and reporting
  • Implement the requirements for Multi-Level and Compartmented Mode security
  • Review all Configuration Control Board items for compliance with security requirements
  • Be responsible for all security-related tasks under all phases of design and evolution through integration and test. Perform trusted system design and evolution
  • Design, develop, engineer, integrate and implement solutions that meet the system’s security requirements
  • Perform vulnerability/risk analysis of computer systems and applications during all phases of the system lifecycle
  • Assess and mitigate system security threats and risks throughout the program life cycle
  • Support the preparation, submission and maintenance of Trusted Facility Manuals, System Security Plans (SSP), Security Concept of Operations (CONOPS), Security Requirements Traceability Matrix (SRTM), and other security related documentation for compliance with security features and enhancements
  • A successful candidate will have experience with creating and executing security certification test plans, performing ISSO-related duties, conducting computer security briefings, conducting security audits and ensuring that the audit records are archived for future reference, and providing recommendations resulting from system vulnerability scan reports and hardening guide documentation
  • BS Degree and five (5) years of related experience OR nine (9) years of related experience in lieu of degree
  • Experience with network protection technologies, operating system vulnerability analysis and correction, methods to mitigate system-wide security vulnerabilities, distribution and transmission techniques, and impedance matching (balanced/unbalanced)
  • Fluent in the Government’s directives governing Multi-Level Security and Compartment Mode systems
  • Active Top Secret Clearance with ability to obtain SCI access. SCI Clearance is required to start on the program
  • BS Degree and nine (9) years of related experience OR 13 of related experience in lieu of degree
  • A successful Cyber Information Assurance Analyst candidate shall have Bachelor’s Degree (or higher) in a technical discipline
  • A successful Cyber Information Assurance Analyst candidate shall meet requirements for the Information Assurance Technical (IAT) Level III certification (e.g.CISSP)
  • A successful candidate should have experience with Apple MacIntosh, COTS, UNIX, Linux and be able to analyze and define security requirements for local and wide area networks
3

Cyber Info Assurance Anlyst Resume Examples & Samples

  • Security Center
  • Splunk
  • Experience with ICD 503
  • NIST SP 800-53
  • FedRAMP
  • SSP
  • Information System Hardening
  • Experience with Cloud based systems
  • Agile/SCRUM experience
  • Windows/Linux/Network experience
4

Cyber Info Assurance Anlyst Resume Examples & Samples

  • Data & traffic analysis
  • Identifying security events (when and how to react to events)
  • Incident response activities
  • Develop trouble tickets & Support System Problem Report analysis
  • Perform system scans, administration, architecture, and engineering duties
  • Participate in technical interchange meetings
  • Provide support for development and enhancement of security engineering inputs to program documentation
  • Provide input to, and interface in customer meetings, or providing status input to higher level management
  • Typical Minimum Education / Experience: 2 Years with Bachelors; 0 Years with Masters / An additional 4 years of experience may be substituted for degree requirement
  • Current valid driver’s license
  • Must have current Top Secret DoD security clearance and able to achieve Tier 1 access eligibility for SAP/SAR Program
  • Familiarity with network security controls such as routers, switches, firewalls, intrusion management solutions, network access control, and related solutions
  • Experience in installing and configuring Linux, Unix and Windows operating systems and applications
  • Must be able to work in a fast-paced environment
  • Ability to work outside of normal working hours and weekends as needed to support the customer’s needs
  • Security+ certification
  • CCENT working towards CCNA & direct experience with networking and CISCO switches and routers
  • Understanding of distributed simulation protocols (e.g., DIS, HLA)
  • Vulnerability assessment experience
  • Recent military experience or familiarity with DOD (Customer is USAF)
5

Cyber Info Assurance Anlyst Resume Examples & Samples

  • Maintain security and auditing of Windows and UNIX operating systems and maintain an understanding of networking and networking components
  • Develop and maintain security baselines for Windows and UNIX operating systems
  • Write system security plans for complex information systems, conducting security reviews and system audits
  • Provide expertise and guidance in the system accreditation process
  • Secure configuration and change management; Event Management; Account Management; Vulnerability Management; Security Incident Management; POA&M Management; Reauthorizations and Decommissioning
  • Minimum 14 years, with Bachelor’s degree and related experience in providing support as an ISSO, Security Engineer/Architect or in the information security arena
  • Strong understanding and following of the Risk Management Framework and the XACTA database
  • Ability to work independently and in groups with leadership attributes. Strong written and verbal communication skills
6

Cyber Info Assurance Anlyst Resume Examples & Samples

  • Ensure information systems supporting MDA Wargames are operated, used, maintained in IAW DOD/MDA/DTWX security policies/practices
  • Ensure users and system support personnel have the required security clearances, authorization, and need to know; are indoctrinated; and are familiar with internal security practices before granting access to the information system
  • Enforce security policies and safeguards on all personnel having access to the information system for which the ISSO is responsible
  • Serve as member of the Engineering Coordination Meeting and Configuration Control Board
  • Initiate protective or corrective measures to maintain security on Wargame information systems
  • Conduct periodic scans and inspections to ensure compliance with the Risk Management Framework (RMF) documentation package
  • Develop RMF documentation in support of accreditation efforts
  • Support to information assurance vulnerability management (IAVM) requirements and ensure security patches are installed, as appropriate
  • Ensure users and system administrators of the system(s) or network(s) are provided appropriate annual network security training
  • Report to the ISSO and/or ISSM as directed
  • Acquire Training – technical and security
  • BS within an engineering discipline from an accredited institutea with 5 years’ experience or Associates degree with 9 years’ experience OR HS Diploma/GED with 12 years’ experience
  • Current active Secret Clearance
  • Must be highly self-motivated, with keen attention to detail; have creative problem-solving abilities; ability to prioritize and execute tasks in a high-pressure environment; work with minimal oversight; enjoy working in a team-oriented, collaborative environment
  • Current ComTIA Security+CE or equivalent DoD 8570 certification
  • Must agree to pursue Security+ the Certified Information Systems Security Professional (CISSP®) or equivalent DoD 8570 certification
  • Familiarity with RMF accreditation process
  • Ability to conduct vulnerability scans using the Assured Compliance Assessment Solution (ACAS)
  • Ability to perform architecture design, engineering, and configuration management reviews (must have an understanding of network administration)
  • Understanding the DoD IAVA/IAVB/IAVT program
  • Familiarity with Windows Active Directory and Windows application security
  • Understanding of security incident handling
  • Ability to analyze IA test results, identify system weaknesses and develop a risk analysis/evaluation Understanding system engineering principles and ability to read and interpret data flow charts, systems diagrams and component configuration depictions
  • Familiarity with UNIX, LINUX, and Windows operating systems
7

Cyber Info Assurance Anlyst Resume Examples & Samples

  • At least 2 years of relevant experience with a Bachelors degree in Technology, Computer Engineering, or other technical field. Or 6 years in lieu of a degree
  • Windows Administration
  • Active Directory Server
  • DNS configuration
  • Group Policy Management
  • Power Shell Scripting
  • Windows Update Server (WSUS)
  • STIG hardening
  • Must be able to obtain and maintain SCI security clearance
  • Active SSBI or SCI clearance
  • Linux Admin
  • Shell scripting
  • STIG Hardening
  • Virtualization
8

Jrdc Cyber Info Assurance Anlyst Resume Examples & Samples

  • 6 years progressive cybersecurity experience
  • Must have DoD 8570.01-M IAT Level III with Continuing Education (CE)
  • Candidate must have a DoD Secret security clearance to start; must have or be able to obtain a DoD Top Secret clearance
  • Experience with must MS Office applications
  • Must be willing to provide training to other engineers if needed
  • Bachelor’s degree in Information Technology or related discipline
  • Current DoD Top Secret clearance. GCIA or GCIH certified preferred
9

Cyber Info Assurance Anlyst Resume Examples & Samples

  • Provide technical security engineering support for projects involving software/hardware/network systems
  • Review requests for adding software to network infrastructure
  • Assist in building IT devices with Microsoft and open source operating systems
  • Oversee Patch Management with a focus on utilizing tools to build queries and
  • Bachelor's Degree in Computer Science, IT or related discipline and 5 years relevant experience. Additional years of experience in lieu of degree is acceptable
  • Must be able to maintain Risk Management Framework accreditation packages and work within DISA sponsored accreditation tracking tools
  • Experience with software tools and Microsoft's suite or office tools
  • CISSP certification or the ability to obtain within 180 days
  • Must have an active DoD Secret Clearance
  • Strong writing and project management skills necessary to oversee engineering
  • Knowledge of NIST accreditation documentation and processes
  • Some experience with TEMPEST enforcement; CAC/PKI technology; Common Criteria requirements; FIPS 140-2 standards; patch management
  • Able to oversee and manage vulnerability remediation efforts
  • Knowledge of intrusion detection and firewall system architecture and management with the ability to review and analyze configurations and make recommendations
10

Cyber Info Assurance Anlyst Resume Examples & Samples

  • BS in Computer Science, Information Systems, or related degree
  • Two (2 ) years Computer Network Defense (CND) experience. Four (4) additional years of CND experience will be accepted in lieu of a degree
  • Advanced understanding of the OSI model and TCP/IP stack as well as it’s well known ports and services
  • Knowledge of CND policies, regulations and compliance documents specific to the DoD
  • Familiarity with CJCSM 6510.01A
  • Understanding of functionality and capabilities of computer network defense technologies, to include: Router ACLs, Firewalls, IDS/IPS, Anti-virus, Web Content Filtering
  • Network Traffic and Packet Analysis
  • Familiarity with basic networking concepts (TCP/IP, Switching, Routing and Firewalls)
  • 8570 Compliant for IAT III CND Analyst or ability to become compliant within 180 days of hire: One of the following: CISA, GSNA or CEH AND one of the following: CISA, GSE, SCNA, GCIH or CISSP
  • 8570 Compliant for IAT III CND Analyst
  • One of the following: CISA, GSNA or CEH AND one of the following: CISA, GSE, SCNA, GCIH or CISSP
11

Cyber Info Assurance Anlyst Resume Examples & Samples

  • Strong skills in ArcSight logger management and operation
  • Directly interface with the Admin/GENSER ISSM and ISSOs to provide coordinated responses to the Tier 2 CSSP on all Admin/GENSER assets
  • Fulfill Network Security Monitoring/Intrusion Detection functions
  • Understand and implement INFOCON/CYBERCON changes within an enterprise
  • Bachelor's Degree and 15 years relevant experience
  • Must have experience with DISA mandated security tools to include Assured Compliance Assessment Solution (ACAS), Host Based Security System (HBSS), analyze results and create reports
  • Must able to write and present complex technical details in preparation to brief senior JRDC and government leadership
  • Experience with various firewall technologies, SNORT, WireShark, Cybersecurity Incident Response procedures& computer forensic techniques
  • Familiarity with MS PowerShell or other scripting languages
  • Strong analytical and reasoning skills
12

Cyber Info Assurance Anlyst Resume Examples & Samples

  • Bachelor’s Degree in Engineering, Computer Science or other similar discipline
  • Excellent interpersonal skills with a demonstrated ability to support complex organizational relationships, technical document preparation and verbal communication skills are required for presentation of technical IA issues and reports
  • NSA/DHS Cyber Defense Education Certificate
  • Candidates with one or more of these desired skills will be given preferential consideration
  • Experience in analysis of IA requirements, IA architecture design, IA audit tools and IA compliance for operational/mission systems
  • Hands on experience in analyzing system security postures and performing risk assessments
  • Knowledge of security policy requirements and technical implementation of security requirements with experience in the Cybersecurity Lifecycle to include: generating IA requirements, conducting IA verification and performing IA compliance activities
13

Cyber Info Assurance Anlyst Resume Examples & Samples

  • Must be able to obtain and maintain a DoD 8570.01-M obtain a CND-Auditor certification (CISA, GSNA, or CEH)
  • Candidate must have an adjudicated DoD Secret security clearance to start and must be able to obtain a DoD Top Secret clearance
  • Experience performing security compliance scans across a WAN (ACAS preferred); strong HBSS background to include configuration, troubleshooting, and deployment; strong technical writing aptitude, and ability to train on the use of tools in understandable terms
  • Willing to work shifts in a 24x7 operational environment, which may include extended hours at no notice, evenings, nights, holidays, and weekends
  • Willing to travel; travel is infrequent and often less than two weeks if needed
14

Cyber Info Assurance Anlyst Resume Examples & Samples

  • Provide support for development and enhancement of security engineering inputs to program documentation and Security Authorization packages
  • Support security controls tailored to meet existing threats
  • Provide input to, and interface in customer meetings, or providing status input to management
  • 5+ years work experience with Bachelors of Science degree in Information Technology, Computer Science, Computer Engineering, or a related field / an additional 4 years of experience may be substituted for degree requirement
  • Must be have a current Secret or Top Secret DoD security clearance and able to achieve Tier 1 access eligibility for SAP/SAR Program
  • Experience with network security controls such as routers, switches, firewalls, intrusion management solutions, network access control, and related solutions
  • Strong troubleshooting skills
  • Familiar with software development lifecycle methodologies
  • Working knowledge of Linux and Windows operating systems and applications
  • Meet DoDD 8570 certification requirements, e.g Security+ certification or CISSP or ability to obtain one within 6 months
15

Cyber Info Assurance Anlyst Resume Examples & Samples

  • 2+ years work experience with Bachelors of Science degree in Computer Science, Computer Engineering, or a related field / an additional 4 years of experience may be substituted for degree requirement
  • Must have current Secret or Top Secret DoD security clearance and able to achieve Tier 1 access eligibility for SAP/SAR Program
  • Experience with Linux, Unix and Windows operating systems and applications
  • Meet DoDD 8570 certification requirements, e.g Security+ certification or ability to obtain one within 6 months
16

Cyber Info Assurance Anlyst Resume Examples & Samples

  • 1) Perform and analyze vulnerability scans without impacting network operations
  • 5) Oversee the Information Assurance Vulnerability Management (IAVM) program; to include dissemination, monitoring, and tracking of IAVM notifications to customers; review of IAVM Plan of Action and Milestones; and provide technical assistance as required
  • 6) Oversee host-based security across the enterprise, to include
  • Bachelor’s degree in Information Technology, Cyber security, or other STEM discipline. Additional years of experience in lieu of degree is acceptable
  • 6 years progressive cyber security experience
  • 8 years of experience total in related IT field, i.e., servers, routers, firewalls
  • Must have a current DoD 8570.01-M IAT Level III certification with Continuing Education (CE)
  • Must be able to obtain a DoD 8570.01-M CNDSP-Auditor certification within 6 months of hire
  • Candidate must have an active DoD Secret security clearance to start; and be able to obtain a DoD Top Secret clearance
  • Must be willing to work rotating shifts in 24x7 operational environment and respond quickly to emergencies as needed
  • Experience performing security compliance scans across a WAN (ACAS preferred)
  • Strong HBSS background to include configuration, troubleshooting, and deployment
17

Cyber Info Assurance Anlyst Resume Examples & Samples

  • 10 years experience
  • IAT III certifcation one of the following: (CISSP, CISA, GCIH, GCED, CASP (CE)
  • Secret Security Clearance (Interim to start)
18

Cyber Info Assurance Anlyst Resume Examples & Samples

  • Conduct assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy
  • Support the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports
  • Assist in implementation of RMF-based policies and procedures; make recommendations on process tailoring, participate in and document process activities
  • Bachelor’s Degree in engineering or related field, 4 years of experience in lieu of a degree, and at least 2 years of experience
  • Must have a Top Secret security clearance
  • Candidate must hold an active DoD 8570 IA Workforce Improvement Program IAT Level II Approved Baseline Certification or be able to obtain one post-employment
19

Cyber Info Assurance Anlyst Resume Examples & Samples

  • College degree must be in Cybersecurity, Information Assurance and/or a IT related field
  • Must be familiar with the Cyber Mission Force Training curriculum as well as Navy training requirements associated with cyber systems and networks
  • Must have a strong knowledge of IT fields associated with Navy networks, computer hardware/software systems, domains and servers, IP addressing and firewalls
  • Must have a minimum of Security+ certification along with Network and Operating Systems certifications
  • Relevant experience and knowledge of reuse, revise, and repurpose (R3) existing Defense Cyber Investigations Academy (DCITA) curriculum
  • Relevant knowledge with Cyber Mission Force (CMF) Training Pipeline version 3.1 and familiarity with existing training courses with a can be R3
  • Must be able to perform onboard the Center for Information Warfare Training (CIWT) located at Corry Station, Pensacola, FL upon award
  • Relevant experience in the application of Military Performance Specifications and Data Item Descriptions (DID). Offerors shall list at least one example of a completed Training Situation Document, Instructional Performance Requirement Document, and Instruction Media Design Plan DID or offerors equivalent completed within the last three years
  • 9 years of experience with Top Secret clearance
20

Cyber Info Assurance Anlyst Resume Examples & Samples

  • Oversee Patch Management with a focus on utilizing tools to build queries and create status reports
  • Understand Cybersecurity and how it affects implementation of new tools like cloud technology
  • Bachelor's degree and 8 years related experience
  • Experience with software tools such as ACAS, STIG Viewer, and Microsoft's suite of office tools
21

Cyber Info Assurance Anlyst Resume Examples & Samples

  • Establish strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems
  • Include support of process, analysis, coordination, security certification test, security documentation, as well as investigations, software research, hardware introduction and release, emerging technology research inspections and periodic audits
  • Assist in the implementation of the Risk Management Framework (RMF), through the required government policy (i.e., NISPOM, JSIG, ICD etc.), make recommendations on process tailoring, participate in and document process activities
  • Document the results of Assessment and Authorization activities and technical or coordination activity and prepare the System Security Plans and update the Plan of Actions and Milestones POA&M
  • Examine potential security violations to determine if the Network Environment (NE) has been breached, assess the impact, and preserve evidence
  • Perform IA related support functions including installation, configuration, troubleshooting, assistance, and/or training, in response to agency requirements for the NE
  • Analyze system performance for potential security problems. Assess the performance of IA security controls within the NE
  • Identify IA vulnerabilities resulting from a departure from the implementation plan or that were not apparent during testing
  • Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements
  • Evaluate potential IA security risks and take appropriate corrective and recovery action
  • Develop and implement access control lists on routers, firewalls, and other network devices
  • Implement applicable patches including IAVAs, IAVBs, and TAs for their NE
  • Monitor/Manage client firewalls and intrusion detection Systems
  • IAM Level-1 Certification (CAP, GSLC or Security + CE)
  • Current Active Secret security clearance
  • Ability to travel (up to 10%)
  • Knowledge and experience of performing assessment of systems and networks to identify deviations from acceptable configurations, enclave/local policies
  • Knowledge and experience with auditing, assessments, and accreditation of classifieds systems within NIST Risk Management Framework and other government policies (NISPOM, JSIG, and ICD)
  • Current Active Top Secret security clearance
22

Cyber Info Assurance Anlyst Resume Examples & Samples

  • Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems. Includes support of process, analysis, coordination, security certification test, security documentation, as well as investigations, software research, hardware introduction and release, emerging technology research inspections and periodic audits. Assists in the implementation of the Risk Management Framework (RMF), through the required government policy (i.e., NISPOM, JSIG, ICD etc.), make recommendations on process tailoring, participate in and document process activities. Performs analyses to validate established security requirements and to recommend additional security requirements and safeguards. Supports the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports. Documents the results of Assessment and Authorization activities and technical or coordination activity and prepare the System Security Plans and update the Plan of Actions and Milestones POA&M. Periodically conducts a complete review of each system's audits and monitor corrective actions until all actions are closed. Specific duties will include, but are not limited to: Examine potential security violations to determine if the Network Environment (NE) has been breached, assess the impact, and preserve evidence. Support, monitor, test, and troubleshoot hardware and software IA problems pertaining to the NE. Perform IA related support functions including installation, configuration, troubleshooting, assistance, and/or training, in response to agency requirements for the NE. Analyze patterns of non-compliance and take appropriate administrative or programmatic actions to minimize security risks and insider threats. Manage accounts, network rights, and access to NE systems and equipment. Analyze system performance for potential security problems. Assess the performance of IA security controls within the NE. Identify IA vulnerabilities resulting from a departure from the implementation plan or that were not apparent during testing. Configure, optimize, and test network servers, hubs, routers, and switches to ensure they comply with security policy, procedures, and technical requirements. Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements. Evaluate potential IA security risks and take appropriate corrective and recovery action. Ensure that hardware, software, data, and facility resources are archived, sanitized, or disposed of in a manner consistent with system security plans and requirements. Perform system audits to assess security related factors within the NE. Develop and implement access control lists on routers, firewalls, and other network devices. Install perimeter defense systems including intrusion detection systems, firewalls, grid sensors, etc., and enhance rule sets to block sources of malicious traffic. Implement applicable patches including IAVAs, IAVBs, and TAs for their NE. Adhere to IS security laws and regulations to support functional operations for the NE. Implement response actions in reaction to security incidents. Support Security Test and Evaluations (Part of C&A Process). Monitor/Manage client firewalls and intrusion detection Systems. This requisition may be filled at a higher grade based on qualifications listed below
  • Experience with Certification and Accreditation process
  • Active CISSP credentials
  • MCSE/RHSA and/or System Administration experience
  • Experience with security hardening, assessment and reporting tools (SCAP, ACAS, HBSS, Nessus, XACTA)
23

Cyber Info Assurance Anlyst Resume Examples & Samples

  • Assists in the implementation of the Risk Management Framework (RMF), through the required government policy (i.e., NISPOM, JSIG, ICD etc.), make recommendations on process tailoring, participate in and document process activities
  • Performs analyses to validate established security requirements and to recommend additional security requirements and safeguards
  • Supports the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports
  • Documents the results of Assessment and Authorization activities and technical or coordination activity and prepare the System Security Plans and update the Plan of Actions and Milestones POA&M
  • Periodically conducts a complete review of each system's audits and monitor corrective actions until all actions are closed
  • Bachelor's or master's degree with a technical emphasis (e.g. Information Systems, Information Technology, Computer Science, EE)
  • Final Top Secret clearance or higher
24

Cyber Info Assurance Anlyst Resume Examples & Samples

  • This position requires a Network Security Engineer to proactively and reactively analyze and guide remediation for vulnerabilities on customer networks to continuously improve enterprise-wide security posture
  • Candidate will
  • Bachelors and five (5) years or more experience; Masters and three (3) years or more experience; PhD and 0 years related experience
  • Bachelor’s degree in Information Technology, Cybersecurity, or other STEM discipline. A Master’s degree may be considered in place of some experience and additional work experience may be equivalent to a Bachelor’s degree