This job is closed

We regret to inform you that the job you were interested in has been closed. Although this specific position is no longer available, we encourage you to continue exploring other opportunities on our job board.

Crimson Phoenix - Springfield, VA

posted 4 months ago

Full-time - Mid Level
Springfield, VA

About the position

As a Cyber Security Operations Specialist II at Crimson Phoenix LLC, you will play a critical role in safeguarding our information systems and ensuring the integrity and confidentiality of data. Under broad direction, you will be responsible for operating and managing all aspects of Information Systems, focusing on data availability, integrity, authentication, confidentiality, and non-repudiation. Your expertise will be essential in implementing and monitoring security measures for communication systems and networks, ensuring that all systems and personnel adhere to established security standards and governmental requirements. In this position, you will develop and execute security policies, plans, and procedures that align with organizational goals and compliance requirements. You will design and implement data network security measures to protect against unauthorized access and cyber threats. Additionally, you will operate Network Intrusion Detection and Forensics, conducting performance analysis of Information Systems security incidents to identify vulnerabilities and improve response strategies. Your responsibilities will also include developing Continuity of Operations and Disaster Recovery plans, supporting the certification of Information Systems and Networks, and supervising the operation of the Electronic Key Management System. You will oversee other information security duties and manage the Public Key Infrastructure, ensuring that all security operations are conducted effectively. Furthermore, you will operate various security tools, including Host Based Security Systems, firewalls, Intrusion Prevention Systems, Intrusion Detection Systems, and Virtual Private Networks, to maintain a robust security posture.

Responsibilities

  • Operating and managing all aspects of Information Systems, focusing on data availability, integrity, authentication, confidentiality, and non-repudiation.
  • Implementing and monitoring security measures for communication systems and networks.
  • Providing advice to ensure systems and personnel adhere to established security standards and governmental requirements.
  • Developing and executing security policies, plans, and procedures.
  • Designing and implementing data network security measures.
  • Operating Network Intrusion Detection and Forensics.
  • Conducting performance analysis of Information Systems security incidents.
  • Developing Continuity of Operations/Disaster Recovery plans.
  • Supporting certification of Information Systems and Networks.
  • Supervising operation of Electronic Key Management System and other information security duties.
  • Operating Host Based Security System, firewalls, Intrusion Prevention Systems, Intrusion Detection Systems, and related security operations.

Requirements

  • Experience in managing information systems and ensuring data integrity and confidentiality.
  • Strong knowledge of security measures for communication systems and networks.
  • Ability to develop and execute security policies and procedures.
  • Experience with data network security measures and intrusion detection systems.
  • Familiarity with disaster recovery and continuity of operations planning.
  • Experience with Electronic Key Management Systems and Public Key Infrastructure.

Nice-to-haves

  • Certifications in cybersecurity (e.g., CISSP, CISM, CEH).
  • Experience with advanced security tools and technologies.
  • Knowledge of governmental security requirements and standards.

Benefits

  • Competitive salary
  • Health insurance
  • Retirement savings plan
  • Professional development opportunities
Job Description Matching

Match and compare your resume to any job description

Start Matching
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service