Here To Apply Now!
Senior Network Security Consultant
The Senior Security Consultant (Security6) will work seamlessly with the Chief Security Engineer to conduct security engineering activities.
-Work with the Infrastructure and Engineering Staff to incorporate tools and best practices that ensure control requirements are addressed to promote a robust security posture for the communications aspects of applications in both a private on premises data centers and public cloud offerings.
-Work closely with project teams to assist in the migration of systems from their current environment into the hybrid TI infrastructure while ensuring the security and integrity of the system.
-Follow documented technical approaches to assess threats and residual risks, along with specifying the implementations required.
-Utilize the organization tasking tracking database, framework and application to manage security operations and make the necessary reports based on due dates, assignments, coordination requirements, percent of completion, completion and archival. Devise solutions to operational problems within the capacity and operational limitations of installed equipment.
-Monitor and track security-related defects and resolutions; assigns tasks to the appropriate working group or individual. Coordinate and facilitate working groups and integrated process teams to achieve solution.
-Assist in establishing and implementing a Continuous Diagnostics and Mitigation (CDM) capability with integrated security controls.
-Focus on communications and networking needs between Cloud and on premises Data Centers, and Cloud and Internet (VPN) users.
-Enable continuous monitoring to proactively survey, monitor, and track security-related defects and the status of their resolution.
-Work within a Sprint to ensure engineering features and enhancements include security requirements and meet Federal directives. Acts as a bridge between project teams or developers and security personnel, by being able to understand and interface in all areas. Identify specific areas of concern related to securing sensitive data in a both a cloud and data center environment.
-Provide thought leadership to provide guidance and best practices
-Provide expertise with Federal Requirements related to special classifications of data especially Title 13 and 26, FISMA, FedRAMP, NIST, etc.
-Acquisition, installation, maintenance, and usage of the Government Enterprise networks.
-Engineering solutions within multiple Cloud Service Providers, in particular AWS.
-Operations for Cisco ASA firewalls, routers and switches and the ability to formulate access control lists (ACLs) via the Command Line Interface (CLI).
-Enterprise level security hardening for Windows, Linux, Android and/or iOS operating systems and SQL, Oracle, and RDS database solutions in accordance with Center for Internet Security (CIS) and Security Technical Implementation Technical Guides (STIGs).
-Continuity of operations (COOP) concepts and implementation for network related hardware failures including isolated and major outages. Monitors and controls the performance and status of the network resources.
-Development and implementation of vulnerability remediation strategies. Configuration and execution of vulnerability and web application scans. Customization compliance scans to meet agency established baselines.
-Implementation PKI within an enterprise.
-Experience working in AWS via the CLI and management console. Knowledge and experience configuring Virtual Private Clouds (VPCs) and understanding the service offerings and how to configure them. Ability to automate the development of security controls including firewall rules and policy and IPS policy.
-Experience with automating server configuration for security including logging, key changes, and system hardening.
-Expert knowledge of network routing and switching fundamentals to include knowledge of -Multiprotocol Layer Switching (MPLS).
-Deep technical understanding of operating systems, network architecture and design, Active Directory (AD) application log consumables, systems design as well as superior knowledge of technical operations process and procedures.
-Expertise in encryption, key management and cryptology.
-Expertise in Enterprise Architecture Standards such as the Department of Defense Architecture Framework (DODAF), Service-Oriented Architecture (SOA), the Open Group Architecture Framework (TOGAF), and/or the Amazon Web Services (AWS) Well Architected Framework.
-Expertise in the Risk Management Framework (NIST 800-37), Security Controls as described in NIST 800-35, and the Federal Information Security Modernization Act (FISMA) operating standards and applicable guidelines (risk profiling, control selection, control assessment, control monitoring).
-Expertise in performing threat modelling, risk analysis, root cause analysis, risk identification, and risk mitigation.
-Expertise in Application Penetration Testing (secure code reviews, fuzzing, reverse engineering, Fortify or similar, IDA Pro).
-Expertise in Proof of Concept (Exploit) development.
-Expertise in Secure SDLC (threat modelling, security requirements, secure design, secure implementation, secure testing, secure maintenance).
-Expertise in Windows and Linux Development Tools.
-Expertise in Web Security (all aspects of OWASP Top 10).
-Expertise in Cloud Security (Infrastructure and Application Layers).
-Expertise in Mobile Application Security.
-Expertise in Embedded Device Security.
-Expertise in Malware Analysis.
Keywords: Greenbelt MD Jobs, Senior Security Consultant Network, Web Application Protocols, Scripting, Software Development Frameworks, Linux, Windows, Maryland Recruiters, Information Technology Jobs, IT Jobs, Maryland Recruiting
If you are an employer and recruiting for similar IT professionals / positions, please contact our Technical Recruiters at Next Step Systems http://www.nextstepsystems.com/employers_submit.htm. We are a national IT Recruiting Firm / Agency specializing in full-time direct hire Information Technology employment opportunities.
No Corp-To-Corp Or Third Party Recruiters; W-2 Direct Hire Only.
To Apply Now, Send Your Resume To http://www.nextstepsystems.com/jobseekers_submit.htm.
services by Next Step Systems - www.nextstepsystems.com
For more information about this opportunity
Current Job News
Hot IT Trading / Financial Services Jobs
Connect with us:
We are working on tech jobs in IL (Chicago
area Computer Jobs), PA, NY, NJ, CT, MA, VA, GA, NC, TN, CA,
TX, AZ, OH, MI, IN, MO, CO, FL, WA, MN and CN. We are specialists
in technology career employment.
We are an equal opportunity Technology Employment
This website is maintained by Next
Jobs in Chicago - Jobs in New York - Jobs in New Jersey
- Jobs in Philadelphia - Jobs in Connecticut - Jobs in Denver
- Jobs in Dallas - Jobs in Houston - Jobs in Phoenix - Jobs
in Silicon Valley - Plus Many More Areas
C++ - C# - .net - Java - Oracle - SQL Server - Unix - Linux
- Networking - Storage - Systems - Support - Sales - Plus
Programmer - Software - Developer - Network Engineer -
Database Analyst - Systems Administrator - Systems Engineer
- Managed Hosting - Manager - Director - VP - CIO - CTO
- Plus More
Executive Search Firm with Specialized Technical
Recruiters or IT Recruiters servicing clients
of all sizes nationally since 1995. IT Recruitment
Firms, IT Recruitment Agencies, Headhunters
and Executive Recruiting Firms. Experience with
Computer Jobs | Information Technology Jobs
or IT Jobs | Tech Jobs | Systems | Programming.
IT Jobs in Chicago | Philadelphia | New York
City - Manhattan | Denver | Dallas | Houston
| Phoenix | Silicon Valley | Plus Many More
Index | Site
Map | Home Page
| About Us |
President | VP
| IT Jobs By Region
Jobs in Trading | Job
Seekers | Employers
| Links Page
| Northeast Jobs
| Southeast Jobs
Jobs | Southwest
Jobs | Canada
Area Trading Jobs in IT | New
York Area Trading Jobs in IT | Philadelphia
Area Trading Jobs in IT | Silicon
Valley Area Trading Jobs in IT