Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
The Cyber Security Team plays a pivotal role in delivering security expertise across various systems, collaborating closely with stakeholders and external partners to facilitate activities, and ensuring successful system authorizations. This is done in accordance with the Sponsor's formalized processes. The Sponsor, in turn, handles coordination and facilitates communication between technical and non-technical teams to support the broader cyber mission. This includes providing expert-level guidance in cyber risk management, vulnerability assessment, mitigation strategies, as well as overseeing both Cloud and On-Premise infrastructure—from application layers to physical components. The Cyber Security Team works cross-functionally to identify, develop roadmaps, and implement advanced cyber security tools, offering best practice recommendations to safeguard a dynamic and diverse infrastructure.
Work Requirements:
- Assist the Sponsor in guiding multiple IT systems through the Assessment and Authorization (A&A) processes
- Support continuous monitoring of IT systems to ensure their accreditation is maintained
- Demonstrate expertise in Networking, Linux, Windows, log analysis, malware detection and mitigation, and the A&A process
- Collaborate with Sponsor personnel to enhance requested metrics and improve security posture
- Provide responses and technical guidance to system security managers
- Develop and maintain A&A documentation, including System Security Plans (SSPs) and Continuous Monitoring plans
- Identify countermeasures for emerging IT threats and vulnerabilities
- Assess potential security risks, recommend mitigation strategies, and implement solutions
- Configure and optimize security-related systems
- Utilize security tools for log analysis, security incident response, vulnerability scanning, and task automation
- Translate customer requirements into effective technical solutions
- Participate in and present at information systems architectural boards at the Group level
- Coordinate engineering projects, conduct technical risk assessments, resolve implementation conflicts, and address technical challenges
- Demonstrated experience in cyber security, InfoSec, security engineering, or network engineering. Demonstrated experience with vulnerability scanning tools. Demonstrated experience analyzing and documenting test results. Demonstrated experience assessing systems against information assurance policies and regulations. Demonstrated experience communicating complex technical concepts to both technical and non-technical audiences. Demonstrated experience coordinating and performing security testing. Demonstrated experience developing risk assessment and certification reports. Demonstrated experience leading security accreditation efforts for enterprise systems. Demonstrated experience recommending mitigating countermeasures to identified threats, vulnerabilities, or shortfalls. Demonstrated experience with Linux operating system. Demonstrated experience writing and reviewing documents such as requirements specifications, system architecture, design documents, test plans, or security plans
Demonstrated experience analyzing existing systems and identifying necessary corrective actions and improvements.
Demonstrated experience preparing program
Desired Qualifications:
- Demonstrated experience with creating and maintaining integrated master schedules
- Demonstrated experience with offensive security practices
- Demonstrated experience explaining protocols, technical procedures and processes clearly and accurately to both technical and non-technical audiences
BpdpDGQ9b2
Key Skills
Ranked by relevanceReady to apply?
Join Hoplite Solutions LLC and take your career to the next level!
Application takes less than 5 minutes