Experience:
5+ years of experience
Concerned about your lack of experience? Learn More...
Employment Type:
Full time
Posted:
8/23/2017
Job Category:
Information Services
See more jobs for students and recent grads who studied:
Cyber Sec Analyst, Principal - Risk Mgmt Job
SAIC | Orlando, Florida
Tell Us More About Your Job Preferences
By telling us what you think of this job, we can help find jobs that match your interests. If you want to see more jobs like this, click on the smiley face. Or if this job isn't what you are looking for, click the frowny face. Learn More...

Follow This Company
Share

Job Description

Cyber Sec Analyst, Principal - Risk Mgmt (Job Number:430084)

Description:


Job Description

- The Principal Cyber Security Risk Management / Technical Security Analyst reports to the Information Technology Office (ITO) GRC Cyber Security Manager / Director within the Cyber Assurance (CA) Directorate's Governance, Risk and Compliance (GRC) division.
- The position exercises significant judgment in working with IT teams within the environment.
- The analyst serves as the Cyber Security point of contact in support of IT portfolio of projects, supplier security evaluations, participate in analysis of alternative workshops and security consultation with regards to company policies and security good practices.
- In addition to primary responsibilities identified below, the Principal Cyber Security Risk Management Analyst will serve as a subject matter expert for network, server, data base management and endpoint technical security requirements, assessing risk, promoting standards and guidelines in information assurance / data management systems.

Primary Responsibilities

- Work on Cyber Security Risk Management and overall GRC team to deliver quality risk assessment reports.
- This requires having an in-depth working experience with an Information Security Risk Assessment using industry standard approach.

Produce the following quality deliverables for SAIC business leadership:

- Written reports and verbal presentations.
- Present security recommendations for complex programs & sourcing decisions.
- Perform system security evaluations on suppliers and vendor products by following prescribed security evaluation criteria.
- Provide input to regularly scheduled platform and project specific meetings
- Produce quality system security risk assessment reports.
- Overall assistance in defining security requirements and strategies for information management system and network architecture design, optimization, and solution delivery.
- Assist platform owners and design teams in applying the necessary security controls to mitigate associated risks
- Function as a technical functional analyst who can navigate and communicate effectively with both technical and engineering teams and at ease with business function leads.
- Assist in evaluating third- party supplier security controls, third-party relationship management, and Security outsourcing background.

Using Security Management Practices and internal policy:

- Conduct risk analysis on existing and to-be web/application/information services
- Document and present findings.
- Apply threat modeling concepts.
- Serve as a security subject matter expert, providing multi-disciplinary knowledge, skills, and experience in technical information assurance and information security management network security and system architecture and database management.
- Consult on current and upcoming projects covering all levels of network architecture and information management systems impact to the overall IT security and IT systems architecture.
- Provide security profiling analysis for a wide range of network security technologies including, but not limited to: firewalls, IPS/IDS, NAC, VPN, proxies, routers, and switches.
- Experience securing common services (i.e. DHCP, DNS, Terminal, WINS, Routing, etc)
- Working knowledge of protocols, network topologies, and perimeter security devices (proxies, IPS, IDS, Firewall and packet analyzers), network security design, and Rights Management Services
- Ensure appropriate security provisioning during varying phases of Software Development Life Cycle.
- Review business requirements and document security requirements for the information systems.
- Ensure system changes and updates remain ITO security policy compliant.
- Ensure security standards are applied from design to UAT.
- Assist in conducting on-site physical security assessments.
- Conduct security risk assessment of supplier (3rd party vendors) and provide recommendations for improving the vendor assessment process.
- Support all facets of the vendor security program, including the evaluation of vendors, development of recommendations to improve security and mitigate security risks.

Qualifications

:
Required Qualifications:

- Fundamental technical knowledge of Active Directory, Windows and Linux OSes, firewalls, networks, Oracle, SQL, stored procedures, scripts and reports.
- Expertise with NIST and ISO 27000 series, particularly NIST SP 800-53, NIST SP 800-171 r1, ISO 27001/2.
- Working knowledge of Security Standards/Controls specified under various IT governance and compliance models (NIST, ISO 27001&27002, ITIL, SOX, and DFARS/FARS). This includes: Applications and Systems Development Security, Security Management Practices, Access Control, Security Architecture and Modeling, Telecommunications, Network Security, Cryptography (PKI), Operations Security, and Physical Security Controls
- Demonstrate success leading and conducting senior level security risk analysis. Specifically, threat modeling involving system decomposition, threat and vulnerability discovery and mitigation.

Education:

- Bachelor's Degree in Information Systems, Computer Science, Information Security or related IT field.
- 8- 10 years relevant risk assessment, information security / analytical experience.
- Experience acting as a Subject Matter Expert or team lead providing guidance to others
- Strong communication skills; person in this role must be able to successfully communicate with management personnel, technical personnel and third parties
- Professional Security Industry Certifications such as CISSP, CCNA, CCIE or other relevant industry certifications through such accrediting bodies such as the DoD, ISC2, ISACA, SANS or Comp TIA.
- Proven ability to work with cross- functional teams.
- Self-starter, individual contributor; must perform with limited or no supervision.
- Possesses proven initiative and developed listening skills.
- Demonstrate timely task completion involving solid organizational skills, task tracking, and follow- up, and productive peer interaction.
- Possess strong technical writing, verbal and presentation skills especially with communicating to PMOs / senior management.
- Provide feedback on internal processes required to help train and mentor other professionals as needed
- Worked with Secure Development Life Cycle and Work experience in a mature risk management team with proven risk assessment methodology.

Desired Qualifications:

- Experience with reviewing systems vulnerabilities for risk and relevance.
- Experience in planning mitigations for systems vulnerabilities
- Extensive understanding of IAM technologies, concepts, policies, processes, best practices, and solutions.
- Knowledge of technology trends and developments in the areas of IAM, and knowledge and experience with formal security and control frameworks such as ISO 17799, COSO, ITIL, and NIST SP 800-53
- Ensure requirements gathered, processes defined, and use cases documented follow out of the box configuration vs. customization for relevant IAM technologies as much as possible.
- Participate Design deployment architectures.
- Participate in capacity planning and HW / SW specification recommendation efforts.
- Participate in all technology deployment activities ranging from design to architecture to configuration and custom development.
- Participate in and/or lead User Acceptance Testing and bug-related engineering efforts.
- Design, implement and educate on code deployment, code migration, and source control use.
- Provide knowledge transfer and post production support activities as necessary.
- Comprehensive understanding of Data Protection solutions and technologies including; Data Loss Prevention (DLP), data masking, tokenization, data classification, and data encryption.

SAIC Overview:SAIC is a premier technology integrator providing full life cycle services and solutions in the technical, engineering, intelligence, and enterprise information technology markets. SAIC is Redefining Ingenuity through its deep customer and domain knowledge to enable the delivery of systems engineering and integration offerings for large, complex projects. SAIC has approximately 15,000 employees are driven by integrity and mission focus to serve customers in the U.S. federal government. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $4.5 billion. For more information, visit saic.com.

EOE AA M/F/Vet/Disability

Job Posting: Aug 21, 2017, 8:32:08 PM
Primary Location: United States-FL-ORLANDO
Clearance Level Must Currently Possess: None
Clearance Level Must Be Able to Obtain: Top Secret/SCI with Polygraph
Potential for Teleworking: No
Travel: Yes, 10% of the time
Shift: Day Job
Schedule: Full-time

This company profile was created by AfterCollege and is about SAIC. This page is not endorsed by or affiliated with SAIC. For questions regarding company profiles, please email: care@aftercollege.com.