Information Assurance III

Insight Global
Montgomery, United States of America
3 days ago

Role details

Contract type
Temporary to permanent
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Senior
Compensation
$ 100K

Job location

Montgomery, United States of America

Tech stack

Data analysis
Computer-Aided Audit Tools
Computer Networks
Issue Tracking Systems
Intrusion Detection Systems
Forescout
Nessus

Job description

Performs assessments of system and network and identifies where the system/network deviate from acceptable configurations, DoD policy, or local policy/guidelines. Measures effectiveness of defense-in- depth architecture against known vulnerabilities using available tools within organization to find them. Analyze, prioritize, and mitigate vulnerabilities to lower or eliminate risk. Create reports to effectively communicate to government problems and proposed solutions. Actively manage (inventory, track, and request corrective action) all hardware devices on network that only authorized devices are given access and unauthorized and unmanaged devices are found and prevented from gaining access. Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution. Submit tickets to appropriate teams for corrective actions. Conduct/review/validate vulnerability scans. Perform vulnerability scans to include analysis of results, identification of false positives, exceptions, and subsequent POA&Ms and/or MFRs creation, monitoring and reporting to include POA&M status and contributions to Monthly and Quarterly reports. Scanning and operations support to include supporting the test/scanning environment, licensing, target asset refreshes, and credentials. Collects and reviews data gathered from a variety of tools (including intrusion detection system alerts, firewall, network traffic logs, and host system logs) to analyze events for possible attacks that occur within the environment. The environments can be computing, network, or enclave. Validates, investigates, and analyzes all response activities related to cyber incidents. These tasks include but are not limited to creating and maintaining incident tracking information; planning, coordinating, and directing recovery activities; and incident tracking information; and incidents analysis tasks, including examining all available information and supporting evidence of artifacts related to an incident or event. Performs assessments of systems and networks within the network environment or enclave and identify where those systems and/or networks deviate from acceptable configurations, enclave policy, or local policy.

Requirements

5+ years of experience in utilizing security relevant tools to include NESSUS, ACAS, DISA STIGs, Audit Tools, Forescout, ESS

Benefits & conditions

Duration: 6-month contract to hire Pay (On contract): $45-$48/hr dependent on experience Conversion Salary: $129,500

Apply for this position