Jump to content

COMPLETE Risk Map Security Analyst Conversion

8 days ago


 Share

Job Opportunity Details

Type

Full Time

Salary

Not Telling

Work from home

No

Weekly Working Hours

Not Telling

Positions

Not Telling

Working Location

Alexandria, Alexandria, VA, United States   [ View map ]
Introduction
Information and Data are some of the most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analyzing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client's organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world.

Your Role and Responsibilities
This position is for a Security Analyst to support the security operations and infrastructure teams on a Federal services contract. The position will assist in technical security engineering programs to implement and maintain operations support.

The candidate will work closely with infrastructure, security operations, ISSO, application, and client teams to support security operations including vulnerability management and ATO support. The candidate will be highly involved in creation and/or maintaining SOPs for Security Team processes. The candidate is expected to lead all aspects of infrastructure security for both on-premises datacenter infrastructure (servers, networking devices, databases, middleware) and virtual compute, database, and network infrastructure in the AWS GovCloud environment. This includes leading the ongoing vulnerability and STIG management, ISVM response, documentation support, and ATO support of the program’s full infrastructure environment in coordination with the infrastructure team.
To be successful in this position, the candidate must display excellent teamwork skills, technical, written and oral communication skills, and ability to learn and adapt in a fast paced environment.

Required Technical and Professional Expertise
• Experience leading the deployment, tracking, and reporting of vulnerability remediation and secure configuration within network, servers, databases, and cloud
• Experiences applying, evaluating, and managing DISA STIG application in enterprise environments
• Experience developing and maintaining SOPs or equivalent technical documentation
• Ability to discuss complex security concepts with technical staff and client stakeholders in a simple, straightforward manner
• Experience supporting of one or more ATO cycles including documentation creation, control self-assessment, artifact gathering, IV&V assessment, and POA&M remediation.
• Excellent communications skills - verbally and in writing and has ability to frequently interface with client stakeholder

Preferred Technical and Professional Expertise

*Security+ or equivalent level certification
*Experience in mentoring individuals and being the bar-raiser in the team
*Understanding of cloud security concepts and methodologies including (i.e. Zero Trust, DevSecOps, Compliance-as-Code)

More Information

Application Details

  • Organization Details
    IBM US
 Share


User Feedback

Recommended Comments

There are no comments to display.

Join the conversation

You are posting as a guest. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Add a comment...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
×
×
  • Create New...