Job Location: Virginia(Hybrid)
Job Description:
For this position we are really looking for someone who is strong in Security Operations (Vulnerability Management, Penetration Testing, Incident Response, Identity Access Management, etc.). A few of the candidates were strong in Risk Management (Risk Assessment, Data Classification, Audits, etc.) but we already have those skills on our team. The remaining candidates mostly struggled to answer basic technical questions relating to security and seemed to mostly come from more IT Operations backgrounds. We are looking for an experienced person as this is not an entry level opening.
General things to consider when screening:
Analyze the security impact of application, configuration, and infrastructure changes to ensure compliance with the security standard as part of the change management lifecycle.
·Assess the configurations of applications, servers, and network devices for compliance with the security standard.
·Analyze and document how the implementation of new system or new interfaces between systems impacts the security posture of the current environment.
·Assess and document the security impact and risks of newly discovered vulnerabilities in the environment.
·Coordinate resolution of application and infrastructure security vulnerabilities with System Owners, IT, and vendors. Track resolution of vulnerabilities and provide regular updates to management.
·Coordinate resolution of endpoint security vulnerabilities with users and provide regular updates to management.
Skill | Required /Desired | Amount of Experience | Candidate Experience |
NIST 800-53 rev 5 and/or Criminal Justice Information System (CJIS) specifications for an information security management system. | Required | 5 |
|
Software development lifecycle, vulnerability management processes, role-based authentication methodologies, etc. | Required | 5 |
|
Familiarity with programming languages such as Python, Java, JavaScript, C++, C#, SQL, HTML, CSS, and/or COBOL. | Required | 5 |
|
Expertise in using automated vulnerability scanners like Nessus, Qualys, Retina, and/or Tenable. | Required | 5 |
|
Familiarity with web application security testing tools like Burp Suite, Fortify, and/or AppScan. | Required | 5 |
|
Basic scripting skills (e.g. WDL, VBScript, JavaScript, PowerShell, Python) for automation | Required | 5 |
|
IT security or risk assessment certifications are advantageous (CISM, CCSP, CISSP, CEH, CompTIA Pentest+ and/or CompTIA Security+) | Required | 5 |
|
...Requisition Number: 200644 Job Description Cintas is seeking a Production Associate - Garment Hanger/Inspector to support the Rental Division. The Garment Hanger/Inspector is responsible for safely and accurately placing customer garments on hangers and for visually...
...current on technological trends to maintain the highest level of understanding of digital forensics best practices Collect, analyze, disseminate... ...video, audio, GPS, RF, or other media formats including computers and cellular phone technology Recover digital and analog...
...conditions. Provides complete high quality optometric/vision care services to members.Essential Responsibilities:+ Upholds Kaiser Permanente's Policies and Procedures, Principles of Responsibilities and applicable state, federal and local laws.+ Provides treatment of...
...Focus Search LLC is recruiting for a Senior Accountant with a growing Medical Services software company, headquartered in the Seattle area. This role will support financial reporting, tax filings, and process improvements. This role involves preparing financial statements...
...accommodation Currently enrolled or recent graduate of an Environmental or closely related (e.g. geology, archaeology, natural resources, ecology, etc.) program Benefits of Employment with the State of Indiana: This seasonal position does not offer benefits and is...