Please scroll down, To apply

Defensive Cyberspace Operations Manager with Security Clearance

hiring now
New job

CSIOS Corporation

2024-10-03 19:43:31

Job location Springfield, Illinois, United States

Job type: fulltime

Job industry: I.T. & Communications

Job description

Provide technical and administrative supervision and guidance for all
contractor cybersecurity personnel
Supervise on-going technical efforts and manage contract performance
Support defensive cyberspace operations and initiatives
Coordinate all day-to-day contract cybersecurity operations, activities, and
deliverables
Liaison between internal command entities, cybersecurity service customers,
and cyber mission partners
Ensure compliance with latest cybersecurity service requirements and other
applicable guidance
Develop and implement formal processes and procedures to support process
and capability improvement; which include but not limited to, incorporating
lessons learned into current processes/procedures; communicating
relationships and trends; identifying potential gaps (e.g., countermeasures,
policies/procedures, infrastructure defenses)
Certifications
One or more approved DoD 8570 baseline certifications for:
IAT III, CSSP Analyst, and CSSP Incident Responder.
Link to approved certifications:

Years of Experience
7+ years of cybersecurity experience; 4+ years of experience applying DoD
policy, direction, and guidance
Position Type Full Time
Other Qualifications
Preferred knowledge and experience with the following:
NIST and DoD security policies
Network architecture and design (e.g., security stack and integration with
office automation products and services)
Securing virtualization/cloud infrastructure concepts, technologies and
services
Auditing (e.g., system accounts, security logs, system/network anomalies).
Cybersecurity Metrics - capture & documentation
Microsoft server and workstation, Unix, and Red Hat Linux Enterprise OS
security configurations
Virtualization functionality and security
Database functionality and security
Border device security (e.g., FW, VLANs, Subnetting, Ports and protocols)
Encryption standards
Insider threat and user activity monitoring concepts and standards
Basic forensic requirements and processes

Inform a friend!

<!– job description page –>

Similar jobs

Top