September 24, 2024

IT Information Security officer

Role Purpose

  • Information & Cyber Security Management, IT Security Physical & Logical Security Management, Security & Vulnerability planning, IT Security Awareness & Policy Development.

 

Key Accountabilities & Activities

  • Provide information security awareness training to organization personnel
  • Oversee information security audits, whether by performed by organization or third-party personnel
  • Evaluate department budget and costs associated with technological training
  • Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement
  • Implement and oversee technological upgrades, improvements and major changes to the information security environment
  • Serve as a focal point of contact for the information security team and the customer or organization
  • Manage and configure physical security, disaster recovery and data backup systems
  • Monitoring of all security operations including SIEM platform, AV, Firewalls, Identity Management Platform, access request processing, digital loss prevention
  • Evaluate and recommend information security technologies and practices
  • Advise on and monitor compliance with information security mandates
  • Interpret security policies, regulations, standards, and other mandates into security control requirements and assess environments against those requirements
  • Advise IT Director on risk levels and security posture.
  • Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders.
  • Ensure that cybersecurity inspections, tests, and reviews are coordinated for the network environment.
  • Oversee the information security training and awareness program.
  • Participate in an information security risk assessment during the Security Assessment and Authorization process.
  • Provide system-related input on cybersecurity requirements to be included in statements of work and other appropriate procurement documents.
  • Recommend resource allocations required to securely operate and maintain an organization’s cybersecurity requirements.
  • Track audit findings and recommendations to ensure that appropriate mitigation actions are taken.
  • Perform analysis of network security, based upon the DCID 6/3, DITSCAP, DIACAP, and NISPOM Chapter 8 certification and accreditation process

Experience & qualifications

  • 1-years’ experience in IT & Cyber Security
  • Bachelor’s degree in IT or computer engineering
  • CISSP, IAM, CISM

 

Knowledge & Skills 

  • Full understanding of ISO27001, NCA, NIS
  • Understanding of Global Security Criteria such as Cybersecurity, Knowledge Assurance
  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures.
  • Knowledge of current and emerging threats/threat vectors.
  • Knowledge of what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities.
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return- oriented attacks, malicious code).