Information Assurance Security Specialist Resume Samples

4.5 (109 votes) for Information Assurance Security Specialist Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the information assurance security specialist job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
JB
J Bradtke
Johathan
Bradtke
5707 Elwyn Street
San Francisco
CA
+1 (555) 633 2829
5707 Elwyn Street
San Francisco
CA
Phone
p +1 (555) 633 2829
Experience Experience
Phoenix, AZ
Information Assurance Security Specialist
Phoenix, AZ
Abernathy, Carroll and Schmidt
Phoenix, AZ
Information Assurance Security Specialist
  • Work with developers to ensure the classified operating system images are configured in accordance with DoD and Army policy
  • Provides technical and analytical guidance to the integration team
  • Provide technical analysis and briefings to the client and senior leadership
  • Lead and/or coordinate annual C&A inspections such as: DAIG, CSA, and CCRI for the classified networks
  • Make recommendations to IT teams on best business practices
  • Public Key Infrastructure and Identity Management
  • Working knowledge of DoD IA tools (e.g., Retina, Nessus, Host Based Security System (HBSS)
Los Angeles, CA
Information Assurance / Security Specialist
Los Angeles, CA
Terry-Green
Los Angeles, CA
Information Assurance / Security Specialist
  • Configuring and monitoring network attached security appliances and products to include Firewalls and other IDS/IPS products on a large enterprise network
  • Performs analysis, design, and development of security features for system architectures
  • Researches, designs, develops and implements monitoring, response and administration of a variety of network security and remote access service
  • Assists with security research, analysis, and design for assigned client computing systems and the network infrastructure
  • Performs security research, analysis, and design for assigned client computing systems and the network infrastructure
  • Responsible for providing technical guidance focused on information security architecture
  • Provides technical engineering services for the support of integrated security systems and solutions
present
Houston, TX
Senior Information Assurance Security Specialist
Houston, TX
Jast, Dare and Reynolds
present
Houston, TX
Senior Information Assurance Security Specialist
present
  • Provide monthly activity report to the program manager
  • Serving as the primary lead for the implementation of Risk Management Framework (RMF) for program developed systems and capabilities
  • Understand, analyze, provide recommendations for improvement in existing processes and process integration
  • Perform analysis and diagnosis of complex voice and data network security issues
  • Work with developers to ensure the image is compliant with DoD and Army policy
  • Manage IAM office user requests and tickets and provide guidance and recommendations that adhere to Army and DoD policy
  • Manage IAM office classified user requests and tickets and provide guidance and recommendations in accordance with Army and DoD policy
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of Washington
Bachelor’s Degree in Computer Science
Skills Skills
  • Working knowledge of IA tools for vulnerability management, host based security, network monitoring, etc
  • Strong ability to develop effective written procedures and SOPs to guide daily operations
  • Highly technical and detail oriented
  • Excellent communication and interpersonal skills
  • Ability to develop effective written procedures and SOPs to guide daily operations
  • Strong problem solving and organizational skills
  • Able to multi-task
  • Excellent written, verbal and problem solving skills
  • Strong interpersonal skills
  • Detail-oriented
Create a Resume in Minutes

8 Information Assurance Security Specialist resume templates

1

Information Assurance Security Specialist Resume Examples & Samples

  • Manage IAM office classified user requests and tickets and provide guidance and recommendations in accordance with Army and DoD policy
  • Assist with Certification and Accreditation packages (DIACAP, NIST, etc) and coordinate with CAR, ACA, and DISA on C&A and connection concerns for classified networks and classified standalone systems
  • Perform IA assessments of the organization and advise on IT security best practices
  • Make technical recommendations to the IAM for system configurations to improve efficiency, reliability, and security
  • Make recommendations to IT teams on best business practices
  • Evaluate new technologies and provide a technical recommendation for the organization to meet mission critical research needs
  • Lead and/or coordinate annual C&A inspections such as: DAIG, CSA, and CCRI for the classified networks
  • Work with developers to ensure the classified operating system images are configured in accordance with DoD and Army policy
  • Assist with unclassified network requests as required
  • Write and annually review Standard Operating Procedures (SOPs)
  • Must be DoD 8570 compliant and maintain required certifications such as: CISSP
  • A total of 11 years relevant IT experience that includes at least 7 years of IA experience and a Bachelor’s degree or equivalent in work experience (4 years total)
  • Mature, self-motivated, adaptable and able to work well in a group environment
  • Excellent written and oral communication skills with the ability to develop and execute detailed written plans for complex software and hardware implementations
  • Able to multi-task and work independently as well as within a team
  • Advanced knowledge of DoD Certification & Accreditation procedures
  • Competent understanding of network architecture and familiarity with classified system environments
  • Proficient understanding of DoD and Army IA policies, guidance, and best practices
  • Skilled with Microsoft Office products such as Word, PowerPoint, and Excel
  • Experience with incident reporting and spillage management
  • Strong ability to develop effective written procedures and SOPs to guide daily operations
  • Ability to maintain professional work appearance, attire, and positive behaviors
  • IASO/ISSO/IAM experience
  • Experience supporting classified programs in an IA capacity
  • Experience working with classified DoD policies and procedures
  • Experience with Vulnerability Management System (VMS), Army NETCROP, and System Center Configuration Manager (SCCM)
2

Information Assurance Security Specialist Resume Examples & Samples

  • Manage IAM office user requests and tickets and provide guidance and recommendations that adhere to Army and DoD policy
  • Perform IA assessments of organization and advise on best IT security practices
  • Make recommendations to IT teams on security best business practices
  • Assist network vulnerability and analysis team
  • Work with developers to ensure the image is compliant with DoD and Army policy
  • DoD 8570 compliant by obtaining/maintaining required certifications such as; CISSP
  • A total 5 years relevant IT experience that includes at least 1 year of IA experience and a Bachelor’s degree or equivalent in work experience (4 years total)
  • Working knowledge of IA tools for vulnerability management, host based security, network monitoring, etc
  • Competent understanding of network architecture
  • Ability to develop effective written procedures and SOPs to guide daily operations
  • Customer friendly
  • Able to multi-task
  • Excellent written, verbal and problem solving skills
  • Skilled with Microsoft Office products for creating documents using Word, PowerPoint, and Excel
  • Experience using DoD IA tools (e.g., Retina, Nessus, Host Based Security System (HBSS))
  • Experience with Vulnerability Management System (VMS), Army NETCROP, System Center Configuration Manager (SCCM)
  • Experience with IAVM Management
  • Experience with Database development
3

Information Assurance Security Specialist Resume Examples & Samples

  • Coordinate remote CCRI assessments of organizations, work with the customers to ensure a thorough understanding of the CCRI process, analyze and advise on best IT security practices for an R&D environment
  • Understand CCRI requirements and be able to provide a per-assessment report to leadership with a recommendation for pass/fail
  • Understand the policy and technical requirements (IAVM/scan results, HBSS status) needed for accreditation
  • Understand Secure Configuration Assessment Protocol (SCAP) configuration scans and configuration of network devices
  • Provide technical analysis and briefings to the client and senior leadership
  • Understand, analyze, provide recommendations for improvement in existing processes and process integration
  • Identify needed mitigations and corrections, and assist with mitigation tracking, reporting, and escalation
  • At least 3 years in an IT security/IAM position
  • Bachelor's degree in CS or related field
  • Familiarity with the DoD accreditation process
  • DoD 8570 compliant by obtaining/maintaining required certifications
  • Familiar with USCC Task Orders and Directives
  • Must be a team player that is eager to assist colleagues and government staff with handling evolving priorities and multiple tasks
  • Active security clearance
  • Working knowledge of DoD IA tools (e.g., Retina, Nessus, Host Based Security System (HBSS)
  • In-depth knowledge of Windows, Apple and UNIX Operating Systems
  • Strong problem solving and business analysis skills
4

Information Assurance / Security Specialist Resume Examples & Samples

  • Must have 4 years of related work experience and a CISSP or CISM
  • Ability to assess and deploy enterprise information assurance and security standards
  • Ability to develop and implement information assurance/security standards and procedures
  • Ability to coordinate, develops, and evaluates security programs for an organization and recommends information assurance/security solutions to support customers' requirements
  • Ability to identify, report, and resolve security violations
  • Ability to establish and satisfy information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands
  • Ability to apply know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures
  • Knowledge and experience with SecurID, Cryptocard, PKI, Kerberos and other security tools
  • Understanding and use of IAVA and IAVA reporting techniques
  • Advanced understanding of operating systems, such as Windows, AIX, RHEL, SLES
  • Experience with Retina, CSA and other security analysis software
  • Relevant IA Certifications preferred
  • Experience providing Information Assurance/Security support for an HPC or complex distributed system environment
  • Prefer an active DoD Secret Clearance
5

Information Assurance / Security Specialist Resume Examples & Samples

  • Performs a variety of systems engineering tasks and activities that are broad in nature and are concerned with major systems design, integration, and implementation, including personnel, hardware, software, budgetary, and support facilities and/or equipment
  • Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures
  • Performs analysis, design, and development of security features for system architectures
  • Designs, develops, engineers, and implements solutions that meet security requirements
  • Provides integration and implementation of the computer system security solution
  • Ensures that all information systems are functional and secure
  • Perform system security tuning, security monitoring, privileged user account management, and reviewing all COTS software products upgrades and patches, including operating systems
  • Monitoring and performing script writing, storage management interfaces, network interfaces, external peripheral interfaces, and others systems interfacing
  • Design and execute security system tests
  • Support all systems/services C&A activities
  • Correlate data from Intrusion Detection and Prevention systems with data from other sources such as firewall, web server, and DNS logs
  • Provide written notification to the customer of significant changes in the security threat against the customer or other specified networks in a timely manner per established reporting methods
  • Maintain system baselines and configuration management items, including security event monitoring “policies” in a manner determined and agreed to by the TM, ensuring that changes are made using the established approval process
  • Produce reports that identify significant, or suspicious, security events to appropriate parties
  • These reports shall include the latest security threat information and link to specific intrusion sets of nation state actors when possible
  • Maintain knowledge of the current security threat level by monitoring related Internet postings, Intelligence reports, and other related documents as necessary
  • Be able to create and add user defined signatures, or custom signatures, in order to compensate for the lack of monitoring in threat areas, as warranted by threat changes, or as directed by the FBI. This includes creating content in a tool as needed
  • Be able to use Case UML processes that identify procedures for correlating security events
  • Develop and utilize “Case Management” processes for incident and resolution tracking and then utilize these processes for historic recording of all anomalous or suspicious activity
  • Perform deep-dive incident analysis by correlating data from various sources
  • Determine if a critical system or data set has been impacted; Advise on remediation; Provide support for new analytic methods for detecting threats
  • Possesses in-depth knowledge on network, endpoint, threat intelligence, forensics and malware reverse engineering, as well as the functioning of specific applications or underlying IT infrastructure; Acts as an incident “hunter” not waiting for escalated incidents; closely involved in developing, tuning, and implementing threat detection analytics
  • Proficient knowledge working in Windows and/or UNIX environments
  • Coordinate responses on C&A, FISMA, Incident Response inquiries, and other system security activities with the ISSO
  • Familiar and have knowledge of NIST 800-53 Recommended Security Controls Security liaison with personnel internal and external to the unit
  • Ensures separation of duties via access control and least privilege
  • High School/GED or higher with 1 to 2 years of relevant experience
  • Candidates with additional education and varying levels of relevant experience are strongly encouraged to apply
  • Prior On-Site DoJ experience
  • IA Certifications desired
  • Knowledge and/or experience in the following COTS applications (and sub/Suite products) or hardware and sub products of vendor product or technology listed should be indicated on Resume
6

Information Assurance / Security Specialist Resume Examples & Samples

  • *This posting is for future vacancies***
  • Responsible for providing technical guidance focused on information security architecture
  • Performs security research, analysis, and design for assigned client computing systems and the network infrastructure
  • Responsible for the prevention, detection, investigation and response with respect to security threats and attacks. Facilitates security vulnerability assessments and penetration tests
  • Responsible for working on security alerts, events, and security incidents, including forensic analysis
  • Helps plan configuration changes for major security infrastructure platforms
  • Implements, documents and may help develop formal security programs and policies throughout the organization and monitors compliance to these policies and programs
  • Researches, designs, develops and implements monitoring, response and administration of a variety of network security and remote access service
  • Configures and validates secure systems and tests security products and systems to detect security weakness
  • Contributes general consulting (risk analysis) and project support in the area of information security to IT infrastructure and division computing projects as needed to support new business requirements
  • Participates in the technical aspects of internal security audits and investigations
  • Manages and maintains a library of security audit tools, and corresponding processes that can be used for system security testing, internal audits, incident response, and diagnosis of security-related system issues
  • Provides technical engineering services for the support of integrated security systems and solutions
  • Monitors trends in information technology and security that could have an impact on the security of the organization’s products, processes, infrastructure, or customers
  • May provide advice and guidance to less experienced staff
  • 2-4 years’ experience in the Information Assurance field
  • A DOD Top Secret Security Clearance with DCID 6/4 eligibility
  • Demonstrated proven experience interacting daily with supervisors and/or functional peer groups as well as directly with demanding customers
  • Excellent customer service skills, both verbal and written
  • Able to work independently as well as within a team
  • Current DOD 8570 IAT Level II certification such as Security+
  • 5+ years’ experience in helpdesk environment
  • B.S. in Computer Science, Information System, Mathematics, or IT related field
  • Desired Military background
  • DOD 8570 IAT Level III certification such as CISSP, CISM
7

Information Assurance / Security Specialist Resume Examples & Samples

  • Participates in the development and implementation of policies, procedures and standards related to information security, privacy and incident response
  • Assists with security research, analysis, and design for assigned client computing systems and the network infrastructure
  • Uses tools and processes to monitor information systems for security-related events
  • Troubleshoots and resolves basic technical issues related with close supervision
  • Helps maintain a library of security audit tools, and corresponding processes that can be used for system security testing, internal audits, incident response, and diagnosis of security-related system issues
  • Implements formal security programs and policies throughout the organization and monitors compliance to these policies and programs
  • May contribute general consulting (risk analysis) and project support in the area of information security to IT infrastructure
  • 0-2 years’ experience in the Information Assurance and Security
  • 2-4 years’ experience in IA environment
  • DOD 8570 IAT Level III, such as CISSP, CISM
8

Information Assurance Security Specialist Resume Examples & Samples

  • Support the System Information System Owner (ISO), with establishing, maintaining, and tracking the security plans from eMASS in accordance with the RMF process as documented at the RMF Knowledge Service, and produce the five artifacts described in the system owners guide to ensure Information Assurance and Computer Security is incorporated into the full life cycle of systems in computer and network infrastructure at all classification levels. This includes establishing Management Internal Control Toolset checklists for inclusion into the Air Force Inspection System
  • Provide a centralized management approach to addressing and sustaining a Cybersecurity POA&M for the tracking and resolution of security controls
  • Assist the System ISSMs with the development and maintenance of organizational and system-level cybersecurity that includes cybersecurity architecture, requirements, objectives and policies, cybersecurity personnel, and cybersecurity processes and procedures
  • Create a centralized, government owned repository for systems to gather pertinent patches, to push said patches to NAWCAD training system sites, and to maintain all organizational and system-related cybersecurity documentation to include Service Level Agreements and Memorandums of Agreement
  • Assist in supporting the System ISSMs with managing and updating cybersecurity information to include verifying artifacts are properly documented in eMASS
  • Develop and provide information assurance (IA) and cybersecurity training, guides and instructions to increase awareness of assigned personnel of the changing IA environment and facilitate streamlining of the Certification and Accreditation process in the future
  • Assist the System Owner in achieving consistent application/implementation of network and system security policies, countermeasures, and procedures under development and fielded System user sites. Assist the ISSMs in assessing the accuracy and completeness of system accreditation packages in accordance with RMF to increase the overall security posture of the programs
  • Review system artifacts (i.e., documents) to determine if they are completed and current. Perform hands-on testing of system security features, as well as witness first-hand, through facility visits, the actual processes related to each IA/security control. Tools such as the Nessus and ACAS scanners will be used to verify Defense Information Systems Agency (DISA) and Security Technical Implementation Guide (STIG) implementation
  • Develop and report relevant metrics and information on cyber security, RMF, CM, and security control status of networks and systems
  • Candidates are required to have at a minimum a DOD 8570.01 IAT Level II certification Sec+
  • 3 years experience in conducting information system security assessments; evaluating Information Assurance and Cybersecurity security controls; conducting and supporting RMF Steps; a strong working knowledge of the Defense Information Assurance Certification and Accreditation Process (DIACAP) is acceptable
  • Possess a strong working knowledge of eMASS and ACAS operations (formal training preferred)
  • Experience in applying information systems security principles and concepts as well as project management principles
  • Experience in applying information systems security concepts and methods across multiple IT disciplines
  • NESSUS, DISA STG Viewer experience
  • Secret security clearance is mandatory, must be eligible for a Top Secret clearance with Sensitive Compartmented Information access
  • Up to 33% travel is required
9

Information Assurance Security Specialist Resume Examples & Samples

  • Support the System Information System Owner (ISO), with establishing, maintaining, and tracking the security plans from eMASS in accordance with the RMF process as documented at the RMF Knowledge Service, and produce the five artifacts described in the system owners guide to ensure Information Assurance and Computer Security is incorporated into the full life cycle of systems in computer and network infrastructure at all classification levels
  • Shall maintain status of C&A packages in requisite tools including DOD eMASS, NAVAIR NCAPP or other Government mandated tracking tools
  • Support the System ISSMs with verifying that ISSOs are appointed in writing and verify that ISSOs are following established cybersecurity policies and procedures
  • Support the System ISSMs with ensuring the secure configuration and approval of information technology below the system level
  • Support the System ISSMs and ISSOs by recommending procedures and corrective measures to initiate when a cybersecurity incident or vulnerability is discovered and ensure that a process is in place for authorized users to report all cybersecurity-related events and potential threats and vulnerabilities to the ISSO
  • Candidates are required to have at a minimum a DOD 8570.01 IAT Level II certification
  • 8 years experience in conducting information system security assessments; evaluating Information Assurance and Cybersecurity security controls; conducting and supporting RMF Steps; a strong working knowledge of the Defense Information Assurance Certification and Accreditation Process (DIACAP) is acceptable
  • Excellent working knowledge of MS Office Applications (Word, Excel, PowerPoint, Outlook and SharePoint)
10

Information Assurance / Security Specialist Resume Examples & Samples

  • Use SIEM technologies and other native tools to perform the monitoring of security events on a 24x7 basis
  • Perform analysis on logs produced by network devices utilized within the OCC such as firewalls, content filtering, syslog from various sources/devices, assorted Intrusion Detection capabilities, substantiating vulnerability scanner results, directory services, DHCP logs, Secure Email Gateway logs, and approved OCC applications
  • Use the Intel McAfee SIEM to monitor the network and perform analysis, while integrating the results and information needed to proactively protect the OCC enterprise
  • This includes developing customized signatures, enterprise content filtering, or firewall ACL change recommendations
  • Provide security events analysis and support to include identifying potential threat, anomalies, and infections, documenting findings, providing recommendations within the OCC’s incident management system, performing triage of incoming security events, performing preliminary and secondary analysis of those events, and validating the events Perform advanced technical analyses, such as analysis of malicious code, network traffic, web log data, cyber intelligence, hard drives, and other storage and forensics media, to control exploitative activity
  • Manage inbound requests via the OCC ticketing system (Service Now), as well as via telephone calls, and provide security notifications via three methods: logging incident tickets, sending emails, and placing telephone calls Provide cybersecurity root-cause analysis in support of any tickets for which it fails to meet the Acceptable Quality Levels (AQLs) specified in the PRS. This root-cause analysis will include documenting recommendations for corrective action
  • Intermediate level knowledge of policies, procedures, and protocols of a government Security Operations Center
  • Experience using numerous security tools and technologies to include some of the following and/or closely comparable security technologies: McAfee Nitro SIEM, McAfee IDS/IPS, Imperva web application firewalls, McAfee Enterprise Antivirus, BlueCoat, Symantec DLP, Mandiant/Fireeye, Guardian MDB Protect, Cisco firewalls, QualysGuard, AppScan
11

Information Assurance / Security Specialist Resume Examples & Samples

  • Performs basic vulnerability scans using vendor utility tools. Monitors security audit and intrusion detection system logs for system and network anomalies. Investigates and/or escalates security violations, attempts to gain unauthorized access, virus infections that may affect the network or other event affecting security. Documents and reports event(s)
  • Assists in providing engineering analysis, design and support for firewalls, routers, networks and operating systems
  • Assists in performing product evaluations and recommends products/services for network security. Validates and tests basic security architecture and design solutions to produce detailed engineering specifications with recommended vendor technologies
  • Develops, tests and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools
  • Assists in the review and recommends the installation, modification or replacement of hardware or software components and any configuration change(s) that affects security
  • Assists in providing oversight and enforcement of security directives, orders, standards, plans and procedures at server sites
  • Performs basic computer and/or network security vulnerability assessments to identify, evaluate and mitigate security risks, threats and vulnerabilities. Assists in integrating, configuring and testing computer and network security solutions to manage the network/system's firewalls and intrusion detection systems
  • As needed, design and develop IA or IA enabled products, interface specifications, and approaches to secure the environment
  • Participate in risk assessment during the certification and accreditation process
  • Ensure that the architecture and design of DoD information systems are functional and secure
  • Experience working with relevant operating system security (Windows, Solaris, Linux, etc.)
  • Experience working with federal regulations related to information security (FISMA, Computer security Act, etc.)
  • TS/SCI required
  • Analytical and problem solving skills to troubleshoot and resolve network/operating system security issues
12

Senior Information Assurance Security Specialist Resume Examples & Samples

  • Perform security accreditation and certifications, as required by DoD Directive 8510.1, Intelligence Community Directive Number 503 Information Technology Systems Security Risk Management, Certification and Accreditation, and the Department of Defense (DoD) Intelligence Information System (DoDIIS) Certification and Accreditation Process
  • Assist with the development of IA policies and procedures as required
  • Verify network and system changes as necessitated by IT security notifications, the Information Assurance Vulnerability Management Program, or as required
  • Bachelor's degree, related technical training (or equivalent experience) plus at least four years of directly related experience
  • CISSP Certification Required
13

Information Assurance Security Specialist Resume Examples & Samples

  • Serving as the primary lead for the implementation of Risk Management Framework (RMF) for program developed systems and capabilities
  • Participating in all phases of system development, to include planning, analysis, evaluation, integration, testing, acceptance, and operations phases
  • Consults with and advises other personnel regarding internal controls and security procedures
  • Prepares activity and progress reports relating to the information systems audit function
  • Designs and prepares technical reports and related documentation, and makes charts and graphs to record results
  • Preparing and delivering presentations and briefings
  • Provides technical and analytical guidance to the integration team
  • Integrates and translates complex concepts into tactical action plans
  • Contributes cyber engineering knowledge in improving the security architecture
  • Must have active Top Secret security clearance
  • Experience implementing cyber security for complex hardware, software, and network infrastructures
  • Knowledge of Information Assurance and Information Operations technologies and development activities
  • Understanding of the processes and guidelines for Certifying & Accrediting information systems based upon experience on a large-scale development program
  • Recent experience with RMF/DIACAP and other Government security frameworks
  • Possesses or quickly develop a comprehensive understanding of Government Information Security policies, regulations, and guidelines
  • Experience integrating complex hardware and software systems
  • 0 to 4 years related experience
  • Experience with three or more of the following
  • Security COTS integration
  • Experience with the National Institute of Standards and Technology (NIST) Risk Management Framework and DoDI 8510.01 Risk Management Framework (RMF) for DoD Information Technology (IT)
  • Six Sigma Certified
  • 4 Years with a BS/BA Systems Engineering, Engineering Management, Computer Systems Engineering, or related degree. Equivalent experience can be considered in lieu of education
  • 2 Years with a MS/MA Systems Engineering, Engineering Management, Computer Systems Engineering, or related degree. Equivalent experience can be considered in lieu of education
  • 0 Years with a PHD in Systems Engineering, Engineering Management, Computer Systems Engineering, or related degree. Equivalent experience can be considered in lieu of education
14

Information Assurance Security Specialist Resume Examples & Samples

  • Perform technical security reviews and network analysis to include scanning, testing, and auditing to determine system vulnerability using established procedures and toolsets
  • Provide monthly activity report to the program manager
  • Ability to obtain DISA Level II System Administrator Certification
15

Information Assurance Security Specialist Junior Resume Examples & Samples

  • Experience with the US Combatant Commands (USCENTCOM/USSOCOM) is desired
  • Working knowledge of the Defense Information Assurance Certification and Accreditation Process (DIACAP) and Risk Management Framework (RMF)
  • Knowledge and experience with DOD IA processes and policies (e.g., CJCSM 6510.01, Incident Response and other IA policies)
16

Senior Information Assurance Security Specialist Expert Resume Examples & Samples

  • Project Management Professional (PMP) certification required
  • Working knowledge of the DISA Security Technical Implementation Guides
  • Must have excellent communications skill (written and oral) and interpersonal skills
17

Information Assurance Security Specialist Resume Examples & Samples

  • At least 5 years in an IT Security, IAM position
  • Familiar with USCC task Orders and directives
  • Active DoD clearance
18

Information Assurance / Security Specialist Resume Examples & Samples

  • Must be US citizen
  • Requires an active SSBI security clearance
  • Applications
19

Information Assurance Security Specialist Resume Examples & Samples

  • Manage a team of Information Assurance Security Specialists
  • Architect, design, and optimize security controls
  • Ensure the technical architecture and physical design of the enterprise network meets all DoD security requirements
  • Perform analysis and diagnosis of complex voice and data network security issues
  • Minimum of 10 years of experience supporting IA or Cyber projects
  • Demonstrated experience with the planning, development, coordination, execution and improvement of compliance related processes
  • Knowledge of DoD 8500 series, NIST SP 800 series, DoD regulations and instructions to include: 8570-01, DoDI 8530.01, CJCSI 6510.01, Risk Management Framework (RMF), DoD Information Assurance Certification and Accreditation Process (DIACAP), technical TTPs (specifically ACAS, SCAP compliance Checker (SCC), STIGS/STIG viewer) and other security monitoring tools
  • Experience with determining applicability and analyzing compliance requirements as defined within Cyber Security Task Orders from higher headquarters to ensure organizational requirements are implemented and verified
  • BS or above in Information Technology or related field
  • DoD IAT Level III Certification is required (CISSP, CISA, CASP CE, etc.)
  • Information Assurance
20

Information Assurance Security Specialist Resume Examples & Samples

  • Strong knowledge of administering ACAS in an (ideally)large environment
  • Strong knowledge of Red Hat or some other type of Linux/Unix
  • Conduct network scans using ACAS and generate reports
  • Conduct web scans using Accunetix WVS and generate reports
  • Possess strong Excel skills with a heavy emphasis on using pivot tables
  • Programming knowledge of PowerShell, Python and Tenable Nessus Plugins and Audits
  • Knowledge to thoroughly evaluate network changes
  • Experience documenting your work and procedures
  • Knowledge of general Vulnerability Management responsibilities
  • Able to work in a dynamic environment
  • Familiarity with DoD and Air Force Cybersecurity policies
  • Highly technical and detail oriented
  • Strong problem solving and organizational skills
  • Familiarity with Air Force organizational and rank structure a plus
  • Minimum of a Secret security clearance
  • DODD 8570 IAT or IAM Level 3 certification (CISM, CISA, CISSP, GCIH, GCED, CASP CE, CRISC, or GSLC)
  • 7+ years of Information Assurance experience and a Bachelor’s of Science or equivalent degree in computer science or related area. Without degree, two additional years of relevant experience
21

Information Assurance / Security Specialist Resume Examples & Samples

  • Typically has 7 or more years of consulting and/or industry experience
  • Ability to support engagements of greater than average size and complexity
  • Ability to lead multiple teams and multiple clients with confidence
  • Excellent teamwork and interpersonal skills
  • Professional oral and written communication skills
  • Ability to mentor and manage junior staff and further their professional growth
  • Ability to maintain the required Secret clearance for this role
  • Effectively document security requirements to inform development of mission area, domain, and program/node architectures
  • Work collaboratively and effectively with other architects in development of DoDAF-compliant architecture computer models
  • Five (5) years experience as an Information Assurance/Security Specialist on programs and contracts of similar scope, type, and complexity is required
  • Bachelor’s degree in Computer Science or related discipline from an accredited college or university is required
  • DoD 8570.01-M Information Assurance Technician level I or Information Assurance Management level I (IAT or IAM Level I) certification is required
  • Experience working with the SparX Enterprise Architecture Software is required. Preferred: DoD 8570.01-M Information Assurance Technician level II or Information Assurance Management level II (IAT or IAM Level II) certification
22

Information Assurance / Security Specialist Resume Examples & Samples

  • Information Assessment and Reporting, System Self Inspection, Auditing, Vulnerability Management and Continuous Monitoring
  • Receive. Acknowledge and track notification of Notice To Airmen (NOTAMS), Time Compliance Network Order (TCNO), Information Assurance Vulnerability Alert (IAVA), Mission Tasking Order (MTO) and take corrective actions to bring into and maintain networks, workstations and equipment compliance and report compliance status
  • May assist program IAOs and/or with scanning networks and devices no less than monthly to perform vulnerability assessments
  • Assists with updates/maintenance of Certification and Accreditation materials and associated artifacts/bodies of evidence via eMASS or other established method IAW DoD DIACAP and RMF directions
  • Must be a U.S. Citizen and in possession of a Secret clearance and have the ability to obtain and maintain a TS Security Clearance
  • DoD 8570.1M IAT II compliant Professional Certification (e.g. Security + CE, CISSP, GSEC, etc.)
  • 2 years of experience in Information Systems Security/Information Assurance, Security Engineering
  • Past experience with management/maintenance of DIACAP security authorization packages and related artifacts, bodies of evidence (past RMF experience highly desired)
  • Experience with eMASS and/or XACTA highly desired
  • Experience with various information system security assessment/hardening tools - ACAS, DISA SRR, STIG's, etc
  • Current Secret, Top Secret clearance or SCI access
  • Self-starter with ability to work with limited supervision, customer service orientated
23

Information Assurance / Security Specialist Resume Examples & Samples

  • Possesses and applies expertise on multiple complex work assignments. Assignments may be broad in nature, requiring originality and innovation in determining how to accomplish tasks. Operates with appreciable latitude in developing methodology and presenting solutions to problems. Contributes to deliverables and performance metrics where applicable
  • Analyzes and defines security requirements for computer systems which may include mainframes, workstations, and
  • Bachelor's degree from an accredited university in computer science, software engineering, information systems, a physical science, engineering or a mathematics-intensive discipline with 2-4 years of Position Relevant experience within the software development lifecycle. Bachelor's Degree requirement may be substituted with an additional six (6) years’ experience for a total of 8-12 years of relevant IT experience
  • Master’s Degree in relevant technical discipline may be substituted for four years’ of relevant experience
  • Meet DoD 8570.01–M for IT Level III including: (a) favorable review of local personnel, base/military, medical, and other security records as appropriate, (b) National Agency Check with Credit Check and Written Inquiries (NACIC) (for civilians) or a National Agency Check with Local Agency and Credit Checks (NACLC) (for military and contractors), or (c) a favorable review of SF 85P and Supplemental Questionnaire
  • Prior DoD ABIS, IAFIS, Enterprise Biometric Systems, Web Application Development is a definite plus
  • Demonstrated experience with similar programs that include development and sustainment, or agile development methodology (Scrum)
  • S/W Language Experience –Required: Java, Oracle, Linux (RHEL and/or CentOS); Desired: Apache Camel, JBoss, Tomcat, Spring, Puppet, Git, JMS, SOAP, REST
24

Information Assurance Security Specialist Resume Examples & Samples

  • 2+ years of experience with conducting DoD network, system, or organizational Cyber readiness inspections, including conducting code reviews, ICS or SCADA inspections, or IA training
  • Experience with the DoD Risk Management Framework (RMF), including the DoD Certification and Accreditation Process (DIACAP), National Information Assurance Certification and Accreditation Process (NIACAP), or DoD Intelligence Information System (DoDIIS) process-
  • IAM Level II Certification, including CASP, CISM, or CISSP
  • Experience with security or system auditing tools, including ACAS, HBSS, or Splunk
  • Experience with analyzing and communicating network security issues to peers and management
  • Experience with mobile code, malicious code, and antivirus software
  • Experience with hacking tools a plus
  • Knowledge of networking and router technologies and network security issues
  • Knowledge of Marine Corps or military organization, culture, and policies
  • Ability to stay abreast of internal and external security best practices
  • Top Secret clearance a plus
  • One or more of the following technical certifications: Microsoft Windows, Red Hat Linux, Cisco, GIAC, including Cyber Defense or Incident Response, HP Fortify, or eWPT
  • CEH Certification a plus