Description

General things to consider when screening:

  1. Experience with vulnerability management is key for this position.
  2. Experience with application penetration is key for this position.
  3. Experience with Dev SecOps/Secure Software Development Lifecycle (Secure SDLC/SSDLC)/Secure by Design is key for this position.
  4. Scripting and automation experience is highly desired for this position.
  5. Interpersonal skills and being able to talk with and manage stakeholders are key for this position. 

 

Analyze the security impact of application, configuration, and infrastructure changes to ensure compliance with the security standard as part of the change management lifecycle.

·Assess the configurations of applications, servers, and network devices for compliance with the security standard.

·Analyze and document how the implementation of new system or new interfaces between systems impacts the security posture of the current environment.

·Assess and document the security impact and risks of newly discovered vulnerabilities in the environment.

·Coordinate resolution of application and infrastructure security vulnerabilities with System Owners, IT, and vendors. Track resolution of vulnerabilities and provide regular updates to management.

·Coordinate resolution of endpoint security vulnerabilities with users and provide regular updates to management.

  • Respond to, and investigate, security incidents and provide thorough post-event analyses.
  • Perform internal application penetration testing, document findings, and recommend improvements to improve the organization’s security posture.
  • Complete annual password security audits and coordinate completion of agency wide user access audits in compliance with the security standard.

·Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately.

  • Create and maintain desk procedures and process documentation for all responsibilities.

 

Skill Matrix:

NIST 800-53 rev 5 and/or Criminal Justice Information System (CJIS) specifications for an information security management system.Required5Years
Software development lifecycle, vulnerability management processes, role-based authentication methodologies, etc.Required5Years
Familiarity with programming languages such as Python, Java, JavaScript, C++, C#, SQL, HTML, CSS, and/or COBOL.Required5Years
Expertise in using automated vulnerability scanners like Nessus, Qualys, Retina, and/or Tenable.Required5Years
Familiarity with web application security testing tools like Burp Suite, Fortify, and/or AppScan.Required5Years
Basic scripting skills (e.g. WDL, VBScript, JavaScript, PowerShell, Python) for automationRequired5Years
IT security or risk assessment certifications are advantageous (CISM, CCSP, CISSP, CEH, CompTIA Pentest+ and/or CompTIA Security+)

Education

Any Graduate