Job Location: Virginia(Hybrid)
Job Description:
For this position we are really looking for someone who is
strong in Security Operations (Vulnerability Management, Penetration Testing,
Incident Response, Identity Access Management, etc.). A few of the candidates
were strong in Risk Management (Risk Assessment, Data Classification, Audits,
etc.) but we already have those skills on our team. The remaining candidates
mostly struggled to answer basic technical questions relating to security and
seemed to mostly come from more IT Operations backgrounds. We are looking for
an experienced person as this is not an entry level opening.
General things to consider when screening:
- Experience with vulnerability management is key for
this position.
- Experience with application penetration is key for this
position.
- Experience with Dev SecOps/Secure Software Development
Lifecycle (Secure SDLC/SSDLC)/Secure by Design is key for this position.
- Scripting and automation experience is highly desired
for this position.
- Interpersonal skills and being able to talk with and
manage stakeholders are key for this position.
Analyze the security impact of application, configuration, and
infrastructure changes to ensure compliance with the security standard as part
of the change management lifecycle.
·Assess the configurations of applications, servers, and network
devices for compliance with the security standard.
·Analyze and document how the implementation of new system or
new interfaces between systems impacts the security posture of the current
environment.
·Assess and document the security impact and risks of newly
discovered vulnerabilities in the environment.
·Coordinate resolution of application and infrastructure
security vulnerabilities with System Owners, IT, and vendors. Track resolution
of vulnerabilities and provide regular updates to management.
·Coordinate resolution of endpoint security vulnerabilities with
users and provide regular updates to management.
- Respond to, and investigate, security incidents and
provide thorough post-event analyses.
- Perform internal application penetration testing, document
findings, and recommend improvements to improve the organization’s
security posture.
- Complete annual password security audits and coordinate
completion of agency wide user access audits in compliance with the
security standard.
- Determine the protection needs (i.e., security
controls) for the information system(s) and network(s) and
document appropriately.
- Create and maintain desk procedures and process
documentation for all responsibilities.
Benefits
Skill
| Required /Desired
| Amount of Experience
| Candidate Experience |
NIST 800-53 rev 5 and/or Criminal Justice Information System (CJIS) specifications for an information security management system.
|
| 5
|
|
Software development lifecycle, vulnerability management processes, role-based authentication methodologies, etc.
|
| 5
|
|
Familiarity with programming languages such as Python, Java, JavaScript, C++, C#, SQL, HTML, CSS, and/or COBOL.
|
| 5
|
|
Expertise in using automated vulnerability scanners like Nessus, Qualys, Retina, and/or Tenable.
|
| 5
|
|
Familiarity with web application security testing tools like Burp Suite, Fortify, and/or AppScan.
|
| 5
|
|
Basic scripting skills (e.g. WDL, VBScript, JavaScript, PowerShell, Python) for automation
|
| 5
|
|
IT security or risk assessment certifications are advantageous (CISM, CCSP, CISSP, CEH, CompTIA Pentest+ and/or CompTIA Security+)
|
| 5
|
|